Journal articles on the topic 'Cloud security challenges'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cloud security challenges.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bhanuprakash, Madupati. "Kubernetes for Multi-Cloud and Hybrid Cloud: Orchestration, Scaling, and Security Challenges." Journal of Scientific and Engineering Research 10, no. 6 (2023): 290–97. https://doi.org/10.5281/zenodo.14050147.
Full textShukla, Surabhi. "Public Cloud Security Challenges & Solution." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 111–17. https://doi.org/10.70729/ijser15100.
Full textLi, Daoming, Qiang Chen, and Lun Wang. "Cloud Security: Challenges and Solutions." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 42–47. https://doi.org/10.5281/zenodo.12789566.
Full textAlrehaili, Nada, and Agadee Mutaha. "Cloud Computing Security Challenges." IARJSET 7, no. 8 (2020): 120–23. http://dx.doi.org/10.17148/iarjset.2020.7817.
Full textSrikanth, Kandragula. "Security and Privacy Challenges." Journal of Scientific and Engineering Research 6, no. 10 (2019): 315–17. https://doi.org/10.5281/zenodo.14050056.
Full textSomanathan, Sureshkumar. "Securing the Cloud: Project Management Approaches to Cloud Security in Multi-Cloud Environments." International Journal of Applied Engineering & Technology 5, no. 2 (2023): 548–56. https://doi.org/10.5281/zenodo.14947914.
Full textSabreena Nawaz. "Cloud Computing Services and Security Challenges: A Review." Lahore Garrison University Research Journal of Computer Science and Information Technology 7, no. 02 (2023): 17–28. http://dx.doi.org/10.54692/lgurjcsit.2023.0702459.
Full textEmad, Al-Mousa. "The Challenges of Securing Cloud Multitenant Design." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 120–24. https://doi.org/10.5281/zenodo.8283155.
Full textFirdaus, Wigananda, and Anjik Sukmaaji. "Exploring Opportunities and Challenges in Multi-Cloud and Hybrid Cloud Implementation." Information Technology International Journal 2, no. 2 (2024): 64–69. https://doi.org/10.33005/itij.v2i2.30.
Full textNanuru Yagamurthy, Deepak, and Rajesh Azmeera. "Security Challenges and Solutions in Cloud Computing." International Journal of Science and Research (IJSR) 7, no. 8 (2018): 1690–93. http://dx.doi.org/10.21275/sr24517174709.
Full textPatil, Asst Prof Swara Snehit. "Cloud Security: Challenges and Mechanisms." International Journal of Advance and Applied Research 6, no. 25(C) (2025): 209–11. https://doi.org/10.5281/zenodo.15331650.
Full textDjamal, Ziani, and Al-Muwayshir Ruba. "Improving Privacy and Security in Multi-Tenant Cloud ERP Systems." Advanced Computing: An International Journal (ACIJ) 8, no. 5 (2017): 01–15. https://doi.org/10.5121/acij.2017.8501.
Full textPriyanka, Vashisht, Bhaskar Bajaj Shalini, Jatain Aman, and Narang Ashima. "Cloud Security: Challenges and Future Scope." International Journal of Innovative Research in Engineering and Management (IJIREM) 10, no. 03 (2023): 44–48. https://doi.org/10.5281/zenodo.8114265.
Full textResearcher. "ADVANCED CLOUD INFRASTRUCTURE SECURITY: TECHNIQUES, CHALLENGES, AND IMPACT." International Journal of Computer Engineering and Technology (IJCET) 15, no. 5 (2024): 892–900. https://doi.org/10.5281/zenodo.13929652.
Full textDegtyarev, N. Yu, G. P. Zhigulin, R. A. Shakirova, and S. A. Bondarev. "ANALYSIS OF CLOUD SECURITY CHALLENGES." Scientific and Technical Volga region Bulletin 6, no. 3 (2016): 104–6. http://dx.doi.org/10.24153/2079-5920-2016-6-3-104-106.
Full textS, Anjali M., Ananya Harshan, and Claijo Kurian V. "Security Challenges in Cloud Computing." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 1626–29. http://dx.doi.org/10.22214/ijraset.2023.49757.
Full textTotade, Mrs Sunita K. "Security Challenges in Cloud Computing." International Journal for Research in Applied Science and Engineering Technology 12, no. 10 (2024): 1360–64. http://dx.doi.org/10.22214/ijraset.2024.64816.
Full textVashisht, Priyanka, Shalini Bhaskar Bajaj, Aman Jatain, and Ashima Narang. "Cloud Security: Challenges and Future Scope." International Journal of Innovative Research in Engineering and Management 10, no. 3 (2023): 44–48. http://dx.doi.org/10.55524/ijirem.2023.10.3.8.
Full textNeerav Nishant, Et al. "The Proposed Framework for Cloud Computing System Security and Privacy Services." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 1197–205. http://dx.doi.org/10.17762/ijritcc.v11i9.9034.
Full textKashif, Munir1 and Prof Dr. Sellapan Palaniappan2. "FRAMEWORK FOR SECURE CLOUD COMPUTING." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 3, April (2018): 01–15. https://doi.org/10.5281/zenodo.1434571.
Full textShettar, Girish, Vidyashree V. Mayacharya, and Suman Totad. "Cloud Computing Challenges." International Journal of Research in Engineering, Science and Management 7, no. 7 (2024): 55–57. https://doi.org/10.5281/zenodo.13902582.
Full textGururaj, H. L. "A comprehensive analysis of security challenges in mobile cloud computing." i-manager’s Journal on Cloud Computing 10, no. 2 (2023): 35. http://dx.doi.org/10.26634/jcc.10.2.20419.
Full textAl-Issa, Yazan, Mohammad Ashraf Ottom, and Ahmed Tamrawi. "eHealth Cloud Security Challenges: A Survey." Journal of Healthcare Engineering 2019 (September 3, 2019): 1–15. http://dx.doi.org/10.1155/2019/7516035.
Full textAijaz, Usman, Mohammed Abubakar, Aditya Reddy, Abuzar ., and Alok C Pujari. "An Analysis on Security Issues and Research Challenges in Cloud Computing." Journal of Security in Computer Networks and Distributed Systems 1, no. 1 (2024): 37–44. http://dx.doi.org/10.46610/joscnds.2024.v01i01.005.
Full textShahzad, Abid, and Mureed Hussain. "Security Issues and Challenges of Mobile Cloud Computing." International Journal of Grid and Distributed Computing 6, no. 6 (2013): 37–50. http://dx.doi.org/10.14257/ijgdc.2013.6.6.04.
Full textSingh Gurjit Singh, Sahibdeep. "Microservices Security Challenges and Solutions in Cloud Environment." International Journal of Science and Research (IJSR) 13, no. 3 (2024): 201–5. http://dx.doi.org/10.21275/sr24303144734.
Full textSingh, Devesh, and Ashwini Kumar Dautaniya. "Cloud Computing Security Challenges and Solution." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 3 (2019): 1185–90. http://dx.doi.org/10.61841/turcomat.v10i3.14399.
Full textNuruddin Sheikh. "Securing the cloud: A comprehensive analysis of data security challenges and solutions." International Journal of Science and Research Archive 13, no. 1 (2024): 3471–83. https://doi.org/10.30574/ijsra.2024.13.01.1779.
Full textMotawie, Rola, Mahmoud M. El-Khouly, and Samir Abou El-Seoud. "Security Problems in Cloud Computing." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 4, no. 4 (2016): 36. http://dx.doi.org/10.3991/ijes.v4i4.6538.
Full textAgarwal, Anamika, Satya Bhushan Verma, and Bineet Kumar Gupta. "A Review of Cloud Security Issues and Challenges." ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal 12 (December 29, 2023): e31459. http://dx.doi.org/10.14201/adcaij.31459.
Full textTiwari, Aniket Rajkumar. "Securing the Cloud: Overcoming Challenges and Implementing Solutions for Effective Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 5100–5111. http://dx.doi.org/10.22214/ijraset.2024.62772.
Full textSyed, Zaid, Kumar Mishra Pranav, TR Yogish, and B. Manjunath. "THE EVOLVING CLOUD SECURITY LANDSCAPE: CHALLENGES AND SOLUTIONS." Recent Trends in Cloud Computing and Web Engineering 7, no. 2 (2025): 1–7. https://doi.org/10.5281/zenodo.15117664.
Full textArshad, Junaid, Paul Townend, Jie Xu, and Wei Jie. "Cloud Computing Security." International Journal of Grid and High Performance Computing 4, no. 1 (2012): 52–66. http://dx.doi.org/10.4018/jghpc.2012010104.
Full textVaikunth, Pai T., and P. S. Aithal. "Cloud Computing Security Issues - Challenges and Opportunities." International Journal of Management, Technology and Social Sciences (IJMTS) 1, no. 1 (2017): 33–42. https://doi.org/10.5281/zenodo.569920.
Full textBallamudi, Venkata Koteswara Rao, and Harshith Desamsetti. "Security and Privacy in Cloud Computing: Challenges and Opportunities." American Journal of Trade and Policy 4, no. 3 (2017): 129–36. http://dx.doi.org/10.18034/ajtp.v4i3.667.
Full textMuhammad Zulkifl Hasan, Zaka Ullah, Taimoor Hasan, and Noor ul Qamar. "Cloud Information Security Challenges and Accountable Solutions." Lahore Garrison University Research Journal of Computer Science and Information Technology 2, no. 1 (2018): 31–36. http://dx.doi.org/10.54692/lgurjcsit.2018.020142.
Full textjaydip, kumar. "Cloud Computing Security Issues and Its Challenges: A Comprehensive Research." International Journal of Recent Technology and Engineering (IJRTE) 8, no. 1S4 (2019): 10–14. https://doi.org/10.5281/zenodo.4408583.
Full textCR, Rachana. "Data Security in Cloud Computing: A Research Perspective." International Journal of Research and Review 9, no. 11 (2022): 325–30. http://dx.doi.org/10.52403/ijrr.20221144.
Full textElaheh, Golzardi. "Cloud Computing Security: A Survey." Journal of Information Sciences and Computing Technologies 5, no. 1 (2015): 377–85. https://doi.org/10.5281/zenodo.3968489.
Full textGehaloach, Pankaj, and Rohit Mahajan. "Cloud Computing Security Issues and Challenges: A Review." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 1 (2018): 60. http://dx.doi.org/10.23956/ijarcsse.v8i1.526.
Full textAruna, Dr L. "Cloud Computing Security Challenges and Risks." International Journal for Research in Applied Science and Engineering Technology V, no. XI (2017): 1635–41. http://dx.doi.org/10.22214/ijraset.2017.11234.
Full textYASAR ARAFATH, A. "CLOUD COMPUTING SECURITY AND ITS CHALLENGES." i-manager’s Journal on Cloud Computing 7, no. 2 (2020): 20. http://dx.doi.org/10.26634/jcc.7.2.17965.
Full textKifayat, Kashif, Madjid Merabti, and Qi Shi. "Future security challenges in cloud computing." International Journal of Multimedia Intelligence and Security 1, no. 4 (2010): 428. http://dx.doi.org/10.1504/ijmis.2010.039241.
Full textRen, Kui, Cong Wang, and Qian Wang. "Security Challenges for the Public Cloud." IEEE Internet Computing 16, no. 1 (2012): 69–73. http://dx.doi.org/10.1109/mic.2012.14.
Full textYan, Gongjun, Ding Wen, Stephan Olariu, and Michele C. Weigle. "Security challenges in vehicular cloud computing." IEEE Transactions on Intelligent Transportation Systems 14, no. 1 (2013): 284–94. http://dx.doi.org/10.1109/tits.2012.2211870.
Full textNicholson, Dave. "Cloud first – tackling the security challenges." Computer Fraud & Security 2018, no. 1 (2018): 8–11. http://dx.doi.org/10.1016/s1361-3723(18)30005-8.
Full textSubramanian, Nalini, and Andrews Jeyaraj. "Recent security challenges in cloud computing." Computers & Electrical Engineering 71 (October 2018): 28–42. http://dx.doi.org/10.1016/j.compeleceng.2018.06.006.
Full textThakker, Jaydeep. "Security Challenges of Vehicular Cloud Computing." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 2, no. 1 (2024): 197–206. http://dx.doi.org/10.60087/jaigs.v2i1.106.
Full textThakker, Jaydeep. "Security Challenges of Vehicular Cloud Computing." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 2, no. 1 (2024): 151–55. http://dx.doi.org/10.60087/jaigs.v2i1.p155.
Full textG Sreenivasa Yadav. "Cloud Guardian: A Comprehensive Approach to Cloud Security Posture Management with Automated Multi-Cloud and Container Security." Communications on Applied Nonlinear Analysis 32, no. 3 (2024): 345–62. http://dx.doi.org/10.52783/cana.v32.1983.
Full text