Journal articles on the topic 'Security in Cloud Computing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security in Cloud Computing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mathkunti, Nivedita M. "Cloud Computing: Security Issues." International Journal of Computer and Communication Engineering 3, no. 4 (2014): 259–63. http://dx.doi.org/10.7763/ijcce.2014.v3.332.
Full textJoshi, Prince, Vishal Dhangar, Manish Muchhala, and Surajbhan Singh Mandloi. "Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 1630–37. http://dx.doi.org/10.22214/ijraset.2023.48889.
Full textR, Jain. "Survey on Mobile Cloud Computing." Advances in Robotic Technology 2, no. 1 (2024): 1–7. http://dx.doi.org/10.23880/art-16000111.
Full textChen, Chih-Yung, and Jih-Fu Tu. "A Novel Cloud Computing Algorithm of Security and Privacy." Mathematical Problems in Engineering 2013 (2013): 1–6. http://dx.doi.org/10.1155/2013/871430.
Full textShyam, Gopal K., and Mir Abdul Samim Ansari. "Security Concerns in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (2018): 2296–301. http://dx.doi.org/10.31142/ijtsrd18306.
Full textD, Mahalakshmi, and Mrs T. Sathiyabama. "Security Issues in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (2018): 881–83. http://dx.doi.org/10.31142/ijtsrd18674.
Full textDutta, Sreejit. "Security Issues in Cloud Computing." International journal of Emerging Trends in Science and Technology 04, no. 11 (2016): 4747–52. http://dx.doi.org/10.18535/ijetst/v3i11.04.
Full textCharles, P. Joseph. "Security Issues in Cloud Computing." International journal of Emerging Trends in Science and Technology 05, no. 06 (2017): 5253–56. http://dx.doi.org/10.18535/ijetst/v4i6.05.
Full textSabanayasmin, J., Dr S. Periyasamy, and Dr K. Balamurugan. "Achieving Security for Cloud Computing." Bonfring International Journal of Networking Technologies and Applications 6, no. 2 (2019): 01–04. http://dx.doi.org/10.9756/bijnta.9037.
Full textArshad, Junaid, Paul Townend, Jie Xu, and Wei Jie. "Cloud Computing Security." International Journal of Grid and High Performance Computing 4, no. 1 (2012): 52–66. http://dx.doi.org/10.4018/jghpc.2012010104.
Full textSHORO, S., S. RAJPER, and B. BALOCH. "Cloud Computing Security." SINDH UNIVERSITY RESEARCH JOURNAL -SCIENCE SERIES 49, no. 004 (2017): 831——834. http://dx.doi.org/10.26692/surj/2017.12.67.
Full textCarlin, Sean, and Kevin Curran. "Cloud Computing Security." International Journal of Ambient Computing and Intelligence 3, no. 1 (2011): 14–19. http://dx.doi.org/10.4018/jaci.2011010102.
Full textJournal, IJSREM. "Cloud Computing Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–7. http://dx.doi.org/10.55041/ijsrem38330.
Full textOjha, Pranav. "Enhanced Cloud Computing Security Based on Single to Multi Cloud Systems." Journal of Research in Science and Engineering 6, no. 8 (2024): 52–56. http://dx.doi.org/10.53469/jrse.2024.06(08).12.
Full textHamlen, Kevin, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham. "Security Issues for Cloud Computing." International Journal of Information Security and Privacy 4, no. 2 (2010): 36–48. http://dx.doi.org/10.4018/jisp.2010040103.
Full textSrivastava, Aryan, and Pawan Singh. "Security Issues in Cloud Computing." Journal of Management and Service Science (JMSS) 2, no. 1 (2022): 1–11. http://dx.doi.org/10.54060/jmss/002.01.003.
Full textWu, Ji Yi, Qian Li Shen, Jian Lin Zhang, and Qi Xie. "Cloud Computing: Cloud Security to Trusted Cloud." Advanced Materials Research 186 (January 2011): 596–600. http://dx.doi.org/10.4028/www.scientific.net/amr.186.596.
Full textTembhare, Yash, Lokesh Kachhi, and Amber Agey. "Cloud Computing –Security Issues and Threats." Journal of Cyber Security, Privacy Issues and Challenges 2, no. 2 (2023): 1–9. http://dx.doi.org/10.46610/jcspic.2023.v02i02.001.
Full textBeckham, Olly, Gord Oldman, Julie Karrie, and Dorth Craig. "Techniques used to formulate confidential data by means of fragmentation and hybrid encryption." International research journal of management, IT and social sciences 6, no. 6 (2019): 68–86. http://dx.doi.org/10.21744/irjmis.v6n6.766.
Full textMouli, K. Chandra, and U. Seshadri. "Singleto Multi Clouds for Security in Cloud Computing by using Secret Key Sharing." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 4 (2013): 1539–45. http://dx.doi.org/10.24297/ijct.v10i4.3254.
Full textAl-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.
Full textK.SAI MANOJ, Dr. "Cloud security: risk factors and security issues in current trends." International Journal of Engineering & Technology 8, no. 4 (2019): 424. http://dx.doi.org/10.14419/ijet.v8i4.29655.
Full textP., Anjaneyulu, and S. Srinivasa Reddy Mr. "Cloud Computing Adoption Approach towards Securing Data in Cloud Computing." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 390–93. https://doi.org/10.31142/ijtsrd12995.
Full textKashif, Munir1 and Prof Dr. Sellapan Palaniappan2. "FRAMEWORK FOR SECURE CLOUD COMPUTING." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 3, April (2018): 01–15. https://doi.org/10.5281/zenodo.1434571.
Full textMotawie, Rola, Mahmoud M. El-Khouly, and Samir Abou El-Seoud. "Security Problems in Cloud Computing." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 4, no. 4 (2016): 36. http://dx.doi.org/10.3991/ijes.v4i4.6538.
Full textR.Manigandan. "Cloud Computing: Security Issues." Shanlax International Journal of Arts, Science and Humanities 6, S1 (2018): 115–23. https://doi.org/10.5281/zenodo.1411009.
Full textElaheh, Golzardi. "Cloud Computing Security: A Survey." Journal of Information Sciences and Computing Technologies 5, no. 1 (2015): 377–85. https://doi.org/10.5281/zenodo.3968489.
Full textSheela Gowr, P., and N. Kumar. "Cloud computing security: a survey." International Journal of Engineering & Technology 7, no. 2.21 (2018): 355. http://dx.doi.org/10.14419/ijet.v7i2.21.12439.
Full textZeel, B. Dabhi, and Kulkarni Akanksha. "Data Security in Cloud Computing." International Journal of Innovative Science and Research Technology 7, no. 12 (2023): 982–86. https://doi.org/10.5281/zenodo.7505036.
Full textMr., Kumar Shivam, and Mahesh Nand Kumar Raval Mr. "Data Security in Cloud Computing." International Journal of Multidisciplinary Research Transactions 4, no. 2 (2022): 25–33. https://doi.org/10.5281/zenodo.6090321.
Full textYupeng, Tuo, Xu Jie, Xu Zhikai, and Ye Jianwei. "Job Security in the Cloud Computing." International Journal of Future Computer and Communication 4, no. 1 (2015): 59–62. http://dx.doi.org/10.7763/ijfcc.2015.v4.356.
Full textPG, Bhavana, and Dr Bhuvana J. "Survey on Cloud Computing Security Issue." International Journal of Research Publication and Reviews 5, no. 3 (2024): 4742–47. http://dx.doi.org/10.55248/gengpi.5.0324.0809.
Full textMahalakshmi., D., and T. Sathiyabama Mrs. "Security Issues in Cloud Computing." International Journal of Trend in Scientific Research and Development 2, no. 6 (2018): 881–83. https://doi.org/10.31142/ijtsrd18674.
Full textYashasvi, Sharma, and Sharma Yashraj. "SECURITY ISSUES AND ENVIRONMENTS IN CLOUD COMPUTING." International Journal of Research - Granthaalayah 7, no. 7 (2019): 398–404. https://doi.org/10.5281/zenodo.3365361.
Full textHitesh Premshankar Rai, Pavan Ogeti, Narendra Sharad Fadnavis, Gireesh Bhaulal Patil, and Uday Krishna Padyana. "Integrating Public and Private Clouds: The Future of Hybrid Cloud Solutions." Universal Research Reports 8, no. 2 (2024): 143–53. http://dx.doi.org/10.36676/urr.v9.i4.1320.
Full textZhu, You Chan, Peng Liu, and Jun Ting Wang. "Cloud Security Research in Cloud Computing." Applied Mechanics and Materials 198-199 (September 2012): 415–19. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.415.
Full textS, Prabu, Gpinath Ganapathy, and Ranjan Goyal. "Enhanced Data Security for Public Cloud Environment with Secured Hybrid Encryption Authentication Mechanisms." Scalable Computing: Practice and Experience 19, no. 4 (2018): 351–60. http://dx.doi.org/10.12694/scpe.v19i4.1422.
Full textGururaj, H. L. "A comprehensive analysis of security challenges in mobile cloud computing." i-manager’s Journal on Cloud Computing 10, no. 2 (2023): 35. http://dx.doi.org/10.26634/jcc.10.2.20419.
Full textBigdeloo, Mansoor, Mostafa Ramezani, and Abolfazl Rafat. "Cloud Computing and Security." Indonesian Journal of Innovation and Applied Sciences (IJIAS) 2, no. 2 (2022): 105–13. http://dx.doi.org/10.47540/ijias.v2i2.518.
Full textAlrehaili, Nada, and Agadee Mutaha. "Cloud Computing Security Challenges." IARJSET 7, no. 8 (2020): 120–23. http://dx.doi.org/10.17148/iarjset.2020.7817.
Full textVorobiev, V,, S. R, Ryzhkov, and R. R. Fatkieva. "Cloud computing security perimeter." Program Systems: Theory and Applications 6, no. 1 (2015): 61–71. http://dx.doi.org/10.25209/2079-3316-2015-6-1-61-71.
Full textSingh, Shweta. "Security in Cloud Computing." International Journal of Computer Applications Technology and Research 3, no. 8 (2014): 488–93. http://dx.doi.org/10.7753/ijcatr0308.1001.
Full textRoyChowdhury, Rajarshi. "Security in Cloud Computing." International Journal of Computer Applications 96, no. 15 (2014): 24–30. http://dx.doi.org/10.5120/16870-6767.
Full textSingh, Nishtha. "Cloud Computing Security Issues." International Journal for Research in Applied Science and Engineering Technology 12, no. 6 (2024): 2295–98. http://dx.doi.org/10.22214/ijraset.2024.63475.
Full textKUMAR, KAPISH. "SECURITY IN CLOUD COMPUTING." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 06 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem36235.
Full textArora, Amandeep Singh. "Security in Cloud Computing." Don Bosco Institute of Technology Delhi Journal of Research 1, no. 2 (2025): 44–51. https://doi.org/10.48165/dbitdjr.2024.1.02.07.
Full textShinde, Asharani, Swapna Ghadge, Vinod Alone, and Jaysing Shinde. "Cloud Computing and Security." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 08 (2014): 1048–52. https://doi.org/10.5281/zenodo.14752162.
Full textVedaprada Raghunath. "Security issues analysis based on big data in cloud computing." World Journal of Advanced Research and Reviews 23, no. 3 (2024): 2549–57. http://dx.doi.org/10.30574/wjarr.2024.23.3.2913.
Full textVedaprada, Raghunath. "Security issues analysis based on big data in cloud computing." World Journal of Advanced Research and Reviews 23, no. 3 (2024): 2549–57. https://doi.org/10.5281/zenodo.14970341.
Full textXie, Hui Juan, Wei She, and Chang Hao Han. "Shamir's Threshold Scheme to Ensure Security in Cloud Computing Services." Applied Mechanics and Materials 543-547 (March 2014): 3632–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3632.
Full text