To see the other types of publications on this topic, follow the link: Security in Cloud Computing.

Journal articles on the topic 'Security in Cloud Computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security in Cloud Computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mathkunti, Nivedita M. "Cloud Computing: Security Issues." International Journal of Computer and Communication Engineering 3, no. 4 (2014): 259–63. http://dx.doi.org/10.7763/ijcce.2014.v3.332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Joshi, Prince, Vishal Dhangar, Manish Muchhala, and Surajbhan Singh Mandloi. "Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 1630–37. http://dx.doi.org/10.22214/ijraset.2023.48889.

Full text
Abstract:
bstract: Cloud computing environment is a new way in which web base enable applications provide as a service for the users with low computational cost through internet. As we store data and it also provide services in distributed environment. Cloud ease its users byproviding virtualization technology of resources through internet. Cloud computing is the emerging field, due to this reason the various new techniques are still developing. At current scenario new security challenges were increases for cloud professionals. Due to lack of security in cloud computing environment user of cloud lost it
APA, Harvard, Vancouver, ISO, and other styles
3

R, Jain. "Survey on Mobile Cloud Computing." Advances in Robotic Technology 2, no. 1 (2024): 1–7. http://dx.doi.org/10.23880/art-16000111.

Full text
Abstract:
The paper explores how cloud computing offers the capacity to improve computing features and application services while addressing its transformative impact on mobile device systems. It recognizes, yet, the security risks associated with transferring data and computing. Using various cloud types for secure information searches and security-critical activities, the research proposal proposes a secure exporting architecture to basic clouds. It shows the significance of cryptography, confidentiality security measures, and data security methods in solving these security issues with cloud computing
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Chih-Yung, and Jih-Fu Tu. "A Novel Cloud Computing Algorithm of Security and Privacy." Mathematical Problems in Engineering 2013 (2013): 1–6. http://dx.doi.org/10.1155/2013/871430.

Full text
Abstract:
The emergence of cloud computing has simplified the flow of large-scale deployment distributed system of software suppliers; when issuing respective application programs in a sharing clouds service to different user, the management of material becomes more complex. Therefore, in multitype clouds service of trust environment, when enterprises face cloud computing, what most worries is the issue of security, but individual users are worried whether the privacy material will have an outflow risk. This research has mainly analyzed several different construction patterns of cloud computing, and qui
APA, Harvard, Vancouver, ISO, and other styles
5

Shyam, Gopal K., and Mir Abdul Samim Ansari. "Security Concerns in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (2018): 2296–301. http://dx.doi.org/10.31142/ijtsrd18306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

D, Mahalakshmi, and Mrs T. Sathiyabama. "Security Issues in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (2018): 881–83. http://dx.doi.org/10.31142/ijtsrd18674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dutta, Sreejit. "Security Issues in Cloud Computing." International journal of Emerging Trends in Science and Technology 04, no. 11 (2016): 4747–52. http://dx.doi.org/10.18535/ijetst/v3i11.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Charles, P. Joseph. "Security Issues in Cloud Computing." International journal of Emerging Trends in Science and Technology 05, no. 06 (2017): 5253–56. http://dx.doi.org/10.18535/ijetst/v4i6.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sabanayasmin, J., Dr S. Periyasamy, and Dr K. Balamurugan. "Achieving Security for Cloud Computing." Bonfring International Journal of Networking Technologies and Applications 6, no. 2 (2019): 01–04. http://dx.doi.org/10.9756/bijnta.9037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Arshad, Junaid, Paul Townend, Jie Xu, and Wei Jie. "Cloud Computing Security." International Journal of Grid and High Performance Computing 4, no. 1 (2012): 52–66. http://dx.doi.org/10.4018/jghpc.2012010104.

Full text
Abstract:
The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible, and highly scalable computing infrastructures. However, as with any other emerging technology, security underpins widespread adoption of Cloud computing. This paper presents the state-of-the-art about Cloud computing along with its different deployment models. The authors also describe various security challenges that can affect an organization’s decision to adopt Cloud computing. Finally, the authors list recommendations
APA, Harvard, Vancouver, ISO, and other styles
11

SHORO, S., S. RAJPER, and B. BALOCH. "Cloud Computing Security." SINDH UNIVERSITY RESEARCH JOURNAL -SCIENCE SERIES 49, no. 004 (2017): 831——834. http://dx.doi.org/10.26692/surj/2017.12.67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Carlin, Sean, and Kevin Curran. "Cloud Computing Security." International Journal of Ambient Computing and Intelligence 3, no. 1 (2011): 14–19. http://dx.doi.org/10.4018/jaci.2011010102.

Full text
Abstract:
In this paper, the authors focus on Cloud Computing, which is a distributed architecture that centralizes server resources on quite a scalable platform so as to provide on demand’ computing resources and services The authors outline what cloud computing is, the various cloud deployment models and the main security risks and issues that are currently present within the cloud computing industry.
APA, Harvard, Vancouver, ISO, and other styles
13

Journal, IJSREM. "Cloud Computing Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–7. http://dx.doi.org/10.55041/ijsrem38330.

Full text
Abstract:
Cloud computing has transformed the IT landscape by providing scalable resources and services over the internet. However, this paradigm shift raises important security issues that need to be addressed to ensure data integrity, privacy and availability. This summary provides an overview of the primary security challenges in cloud computing, including data breaches, unauthorized access rights, and shared infrastructure vulnerabilities. It examines the various strategies and technologies used to mitigate these risks, such as encryption, multi-factor authentication and robust monitoring systems. I
APA, Harvard, Vancouver, ISO, and other styles
14

Ojha, Pranav. "Enhanced Cloud Computing Security Based on Single to Multi Cloud Systems." Journal of Research in Science and Engineering 6, no. 8 (2024): 52–56. http://dx.doi.org/10.53469/jrse.2024.06(08).12.

Full text
Abstract:
Cloud computing has increased rapidly in many organizations and then it's utilized. Cloud computing provides safe data. Cloud computing provides many advantages in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. Dealing with "single cloud" providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the sin
APA, Harvard, Vancouver, ISO, and other styles
15

Hamlen, Kevin, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham. "Security Issues for Cloud Computing." International Journal of Information Security and Privacy 4, no. 2 (2010): 36–48. http://dx.doi.org/10.4018/jisp.2010040103.

Full text
Abstract:
In this paper, the authors discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer. In particular, the authors discuss a scheme for secure third party publications of documents in a cloud. Next, the paper will converse secure federated query processing with map Reduce and Hadoop, and discuss the use of secure co-processors for cloud computing. Finally, the authors discuss XACML implementation for Hadoop and discuss their beliefs that building trusted applications from untrusted
APA, Harvard, Vancouver, ISO, and other styles
16

Srivastava, Aryan, and Pawan Singh. "Security Issues in Cloud Computing." Journal of Management and Service Science (JMSS) 2, no. 1 (2022): 1–11. http://dx.doi.org/10.54060/jmss/002.01.003.

Full text
Abstract:
Cloud computing has aided the evolution of IT by improving the ability and flexibility of data storage, as well as providing scalable computation and processing capabilities that match the dynamic data sets. Many corporate application programs have been transferred to public and hybrid clouds due to the multiple benefits of cloud computing. On the other hand, many businesses identify privacy and data security as major concerns that prevent them from adopting cloud computing. The only way to achieve successful cloud implementation is to improve and manage data security and privacy in the cloud.
APA, Harvard, Vancouver, ISO, and other styles
17

Wu, Ji Yi, Qian Li Shen, Jian Lin Zhang, and Qi Xie. "Cloud Computing: Cloud Security to Trusted Cloud." Advanced Materials Research 186 (January 2011): 596–600. http://dx.doi.org/10.4028/www.scientific.net/amr.186.596.

Full text
Abstract:
Cloud computing, with exciting market prospects, has a number of potential risks and safety issues to the cloud services users. After an objective analysis of the security challenge and problem, in current cloud computing development, the latest research progress in the field of cloud security were summarized. Finally, the important research directions in the field were pointed out. It’s will be a new trend for the cloud computing and trusted computing technology to integrate..
APA, Harvard, Vancouver, ISO, and other styles
18

Tembhare, Yash, Lokesh Kachhi, and Amber Agey. "Cloud Computing –Security Issues and Threats." Journal of Cyber Security, Privacy Issues and Challenges 2, no. 2 (2023): 1–9. http://dx.doi.org/10.46610/jcspic.2023.v02i02.001.

Full text
Abstract:
One of the most exciting topics in the IT business nowadays is cloud computing. The cloud computing resource paradigm has changed the geography of computing. Computing's promises of cost reductions, enormous scalability, lower dependency on third parties, and increased trust have attracted both businesses and individuals. This increases the power of information technology. Cloud computing has grown significantly recently in the field of information technology. Concerns over information security are growing as more and more people and businesses store information in the cloud. Many companies, i
APA, Harvard, Vancouver, ISO, and other styles
19

Beckham, Olly, Gord Oldman, Julie Karrie, and Dorth Craig. "Techniques used to formulate confidential data by means of fragmentation and hybrid encryption." International research journal of management, IT and social sciences 6, no. 6 (2019): 68–86. http://dx.doi.org/10.21744/irjmis.v6n6.766.

Full text
Abstract:
Cloud computing is a concept shifting in the approach how computing resources are deployed and purchased. Even though the cloud has a capable, elastic, and consistent design, several security concerns restrain customers to completely accept this novel technology and move from traditional computing to cloud computing. In the article, we aspire to present a form of a novel architectural model for offering protection to numerous cloud service providers with the intention to devise and extend security means for cloud computing. In this work, we presented a two-tier architecture for security in mul
APA, Harvard, Vancouver, ISO, and other styles
20

Mouli, K. Chandra, and U. Seshadri. "Singleto Multi Clouds for Security in Cloud Computing by using Secret Key Sharing." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 4 (2013): 1539–45. http://dx.doi.org/10.24297/ijct.v10i4.3254.

Full text
Abstract:
Now a day Cloud Computing is rapidly using computing technology. For low cost and high-end benefits this cloud computing is utilized. The major issue in this cloud computing is Ensuring the security, because the often store sensitive data with third party cloudproviders but these providers may beuntrusted.Working with single cloud is prevented, because in customer’s perception the failure in service availability and thepossibility of viciousgang in single cloud. To overcome these types of failures, a recent and popular technology is emerged called cloud of clouds or multi clouds or inters cl
APA, Harvard, Vancouver, ISO, and other styles
21

Al-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.

Full text
Abstract:
Cloud computing has led to the development of IT to more sophisticated levels by improving the capacity and flexibility of data storage and by providing a scalable computation and processing power which matches the dynamic data requirements. Cloud computing has many benefits which has led to the transfer of many enterprise applications and data to public and hybrid clouds. However, many organizations refer to the protection of privacy and the security of data as the major issues which prevent them from adopting cloud computing. The only way successful implementation of clouds can be achieved i
APA, Harvard, Vancouver, ISO, and other styles
22

K.SAI MANOJ, Dr. "Cloud security: risk factors and security issues in current trends." International Journal of Engineering & Technology 8, no. 4 (2019): 424. http://dx.doi.org/10.14419/ijet.v8i4.29655.

Full text
Abstract:
Now a days, cloud computing is an emerging and way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed compu-ting. Today cloud computing is used in both industrial, research and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. This increase in cloud computing environment also increases security challenges for cloud
APA, Harvard, Vancouver, ISO, and other styles
23

P., Anjaneyulu, and S. Srinivasa Reddy Mr. "Cloud Computing Adoption Approach towards Securing Data in Cloud Computing." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 390–93. https://doi.org/10.31142/ijtsrd12995.

Full text
Abstract:
Present or late investigation on cloud security communicates that the security of customers data has the most astonishing need and furthermore concern. Customers store colossal measures of delicate data on a cloud. Sharing sensitive data will empower attempts to reduce the cost of giving customers redid advantages and offer some motivating force included data organizations. Regardless, secure data sharing is risky. Security is a champion among the most troublesome errand to realize in cloud computing. Assorted sorts of strikes in the application side and in the gear parts. This paper proposes
APA, Harvard, Vancouver, ISO, and other styles
24

Kashif, Munir1 and Prof Dr. Sellapan Palaniappan2. "FRAMEWORK FOR SECURE CLOUD COMPUTING." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 3, April (2018): 01–15. https://doi.org/10.5281/zenodo.1434571.

Full text
Abstract:
Cloud computing has changed the entire process that distributed computing used to present e.g. Grid computing, server client computing. Cloud computing describes recent developments in many existing IT technologies and separates application and information resources from the underlying infrastructure. Cloud computing security is an important aspect of quality of service from cloud service providers. Security concerns arise as soon as one begins to run applications beyond the designated firewall and move closer towards the public domain. In violation of security in any component in the cloud ca
APA, Harvard, Vancouver, ISO, and other styles
25

Motawie, Rola, Mahmoud M. El-Khouly, and Samir Abou El-Seoud. "Security Problems in Cloud Computing." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 4, no. 4 (2016): 36. http://dx.doi.org/10.3991/ijes.v4i4.6538.

Full text
Abstract:
Cloud is a pool of computing resources which are distributed among cloud users. Cloud computing has many benefits like scalability, flexibility, cost savings, reliability, maintenance and mobile accessibility. Since cloud-computing technology is growing day by day, it comes with many security problems. Securing the data in the cloud environment is most critical challenges which act as a barrier when implementing the cloud. There are many new concepts that cloud introduces, such as resource sharing, multi-tenancy, and outsourcing, create new challenges for the security community. In this work,
APA, Harvard, Vancouver, ISO, and other styles
26

R.Manigandan. "Cloud Computing: Security Issues." Shanlax International Journal of Arts, Science and Humanities 6, S1 (2018): 115–23. https://doi.org/10.5281/zenodo.1411009.

Full text
Abstract:
Cloud computing is an architecture which provides computing service through the internet on demand and pays per use access to a pool of shared resources namely networks, storage, servers, services and applications, without physically acquiring them. So it saves managing cost and time for organizations. Many industries are moving towards the cloud due to the efficiency of services provided by the pay-per-use pattern based on the resources such as processing power used, transactions carried out, bandwidth consumed, data transferred, or storage space occupied, e
APA, Harvard, Vancouver, ISO, and other styles
27

Elaheh, Golzardi. "Cloud Computing Security: A Survey." Journal of Information Sciences and Computing Technologies 5, no. 1 (2015): 377–85. https://doi.org/10.5281/zenodo.3968489.

Full text
Abstract:
Today, the world of Internet and Information technology, which is turned into a crucial part of human life, is growing rapidly. In this direction, the needs of societies` members including: information security, fast processing, immediate & dynamic access and the most important one, cost saving have been taken into consideration. Security issues used to be the main challenge of the systems` users constantly. A crucial achievement, by which users` data are accessed broadly & comprehensively, is cloud computing and storage in clouds, but this requires establishing data security in a very
APA, Harvard, Vancouver, ISO, and other styles
28

Sheela Gowr, P., and N. Kumar. "Cloud computing security: a survey." International Journal of Engineering & Technology 7, no. 2.21 (2018): 355. http://dx.doi.org/10.14419/ijet.v7i2.21.12439.

Full text
Abstract:
Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with
APA, Harvard, Vancouver, ISO, and other styles
29

Zeel, B. Dabhi, and Kulkarni Akanksha. "Data Security in Cloud Computing." International Journal of Innovative Science and Research Technology 7, no. 12 (2023): 982–86. https://doi.org/10.5281/zenodo.7505036.

Full text
Abstract:
The importance of data security has been a significant problem in information technology. Because the data is spread out all over the place in the field of technology, it becomes extremely problematic. Users' primary worries regarding cloud computing are related to data security and privacy security. Despite the fact that numerous approaches to the issue of cloud computing have been studied in academic research and clinical trials, data security and privacy protection are becoming increasingly crucial for the future use of cloud computing technology in business, industry, and government. I
APA, Harvard, Vancouver, ISO, and other styles
30

Mr., Kumar Shivam, and Mahesh Nand Kumar Raval Mr. "Data Security in Cloud Computing." International Journal of Multidisciplinary Research Transactions 4, no. 2 (2022): 25–33. https://doi.org/10.5281/zenodo.6090321.

Full text
Abstract:
This research basically centers on the data security on Cloud Computing. It could be a consider of information on the cloud and perspectives relating to it for the concern of security. The paper will go in to subtle elements of information assurance strategies and approaches utilized all through the world to guarantee most extreme information security by reducing risks and dangers. Accessibility of information within the cloud is useful for numerous applications but it postures dangers by uncovering information to applications which might as of now have security escape clauses in them. Additio
APA, Harvard, Vancouver, ISO, and other styles
31

Yupeng, Tuo, Xu Jie, Xu Zhikai, and Ye Jianwei. "Job Security in the Cloud Computing." International Journal of Future Computer and Communication 4, no. 1 (2015): 59–62. http://dx.doi.org/10.7763/ijfcc.2015.v4.356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

PG, Bhavana, and Dr Bhuvana J. "Survey on Cloud Computing Security Issue." International Journal of Research Publication and Reviews 5, no. 3 (2024): 4742–47. http://dx.doi.org/10.55248/gengpi.5.0324.0809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Mahalakshmi., D., and T. Sathiyabama Mrs. "Security Issues in Cloud Computing." International Journal of Trend in Scientific Research and Development 2, no. 6 (2018): 881–83. https://doi.org/10.31142/ijtsrd18674.

Full text
Abstract:
Using a set of presented package and properties through the internet is called cloud computing. Data hubs located everywhere the world offer the cloud services. As this field of machinery seen a express growth in current times, security has been the foremost distress. Security is the main issues for all technology both it was from past or newly modernized. The information might be own or executive data stored in the cloud is facing probable dangers from hackers and there is a need to categorize the possible security holes that can be made more secure and tough. One work in this field will enab
APA, Harvard, Vancouver, ISO, and other styles
34

Yashasvi, Sharma, and Sharma Yashraj. "SECURITY ISSUES AND ENVIRONMENTS IN CLOUD COMPUTING." International Journal of Research - Granthaalayah 7, no. 7 (2019): 398–404. https://doi.org/10.5281/zenodo.3365361.

Full text
Abstract:
This paper will explore the service models and background and also presents the existing research issues implicating in cloud computing such as security, privacy, reliability, and so on. Cloud Computing, Architecture and Characteristics of Cloud Computing and also different Services and Deployment models provided in Cloud Computing. This paper provides a better understanding of the cloud computing and identifies important research issues in this rapidly growing area of computer science.
APA, Harvard, Vancouver, ISO, and other styles
35

Hitesh Premshankar Rai, Pavan Ogeti, Narendra Sharad Fadnavis, Gireesh Bhaulal Patil, and Uday Krishna Padyana. "Integrating Public and Private Clouds: The Future of Hybrid Cloud Solutions." Universal Research Reports 8, no. 2 (2024): 143–53. http://dx.doi.org/10.36676/urr.v9.i4.1320.

Full text
Abstract:
A hybrid cloud system basically mixes on-premises and cloud computing resources to provide workload distribution, security, and mobility. A hybrid cloud might contain two or more personal clouds, or it could have one public cloud and one private cloud, depending on what is needed. Typically, third-party providers like Microsoft, Google, and Amazon offer cloud services to the public. The primary goal of cloud computing, which is an innovative approach, is to provide net computation and safe, rapid, and easy data storage. Security concerns are crucial even if cloud computing significantly lowers
APA, Harvard, Vancouver, ISO, and other styles
36

Zhu, You Chan, Peng Liu, and Jun Ting Wang. "Cloud Security Research in Cloud Computing." Applied Mechanics and Materials 198-199 (September 2012): 415–19. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

S, Prabu, Gpinath Ganapathy, and Ranjan Goyal. "Enhanced Data Security for Public Cloud Environment with Secured Hybrid Encryption Authentication Mechanisms." Scalable Computing: Practice and Experience 19, no. 4 (2018): 351–60. http://dx.doi.org/10.12694/scpe.v19i4.1422.

Full text
Abstract:
Cloud computing is an evolving computing technology that provides many services such as software and storage. With the introduction of cloud storage, the security of outsourced data has become a major issue in cloud computing. Data storage in cloud computing environment needs to be secured in order to provide a safe and foolproof security for data outsourcing of the cloud service users. This paper presents a model for security of data in public cloud storage environment which successfully detects the unauthenticated access or any anomaly in the data. The proposed authentication model along wit
APA, Harvard, Vancouver, ISO, and other styles
38

Gururaj, H. L. "A comprehensive analysis of security challenges in mobile cloud computing." i-manager’s Journal on Cloud Computing 10, no. 2 (2023): 35. http://dx.doi.org/10.26634/jcc.10.2.20419.

Full text
Abstract:
The computing capability of mobile systems is enhanced by cloud computing. Mobile devices can rely on cloud computing to perform computationally intensive operations such as data mining and searching. Mobile cloud computing refers to the availability of cloud computing services in a mobile environment. It is a combination of mobile networks and cloud computing, providing optimal services for mobile users. The use of mobile cloud computing overcomes performance-related obstacles, such as bandwidth, storage capacity, and battery life, as well as environment-related issues like availability, scal
APA, Harvard, Vancouver, ISO, and other styles
39

Bigdeloo, Mansoor, Mostafa Ramezani, and Abolfazl Rafat. "Cloud Computing and Security." Indonesian Journal of Innovation and Applied Sciences (IJIAS) 2, no. 2 (2022): 105–13. http://dx.doi.org/10.47540/ijias.v2i2.518.

Full text
Abstract:
Following personal computers, one of the most important innovations in the IT industry is cloud computing ad it appeared with the advent of a major revolution in the IT industry. Cloud computing allows organizations to reduce or increase their resources according to operational needs. In fact, cloud computing means the development and deployment of computer technology to provide computational resources through the Internet. Cloud computing is an information space architecture that allows network-based and demand-driven access to a large array of common computing resources at very low cost, hig
APA, Harvard, Vancouver, ISO, and other styles
40

Alrehaili, Nada, and Agadee Mutaha. "Cloud Computing Security Challenges." IARJSET 7, no. 8 (2020): 120–23. http://dx.doi.org/10.17148/iarjset.2020.7817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Vorobiev, V,, S. R, Ryzhkov, and R. R. Fatkieva. "Cloud computing security perimeter." Program Systems: Theory and Applications 6, no. 1 (2015): 61–71. http://dx.doi.org/10.25209/2079-3316-2015-6-1-61-71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Singh, Shweta. "Security in Cloud Computing." International Journal of Computer Applications Technology and Research 3, no. 8 (2014): 488–93. http://dx.doi.org/10.7753/ijcatr0308.1001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

RoyChowdhury, Rajarshi. "Security in Cloud Computing." International Journal of Computer Applications 96, no. 15 (2014): 24–30. http://dx.doi.org/10.5120/16870-6767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Singh, Nishtha. "Cloud Computing Security Issues." International Journal for Research in Applied Science and Engineering Technology 12, no. 6 (2024): 2295–98. http://dx.doi.org/10.22214/ijraset.2024.63475.

Full text
Abstract:
Abstract: Cloud computing is an approach to manage limitations or include restrains progressively without setting resources into new structure, preparing new work force or favouring new programming. As information exchange is a noteworthy activity in the current life, information security ends up being a significant issue. Prior to dissecting the security concerns, the importance of distributed or cloud-based processing is examined, and a number of cloud-based security-related challenges have been analyzed. The security issues identified with cloud computing has been investigated here and a lo
APA, Harvard, Vancouver, ISO, and other styles
45

KUMAR, KAPISH. "SECURITY IN CLOUD COMPUTING." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 06 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem36235.

Full text
Abstract:
By offering scalable and easily available computer resources over the internet, cloud computing has radically changed IT infrastructures all around. Ensuring the security of cloud systems remains a major difficulty even if they are used widely in many different fields. This abstract explores the intricate elements of cloud computing security including technical advancement, challenges, and methods. Data breaches, insider threats, and compliance complexities are among the main challenges; strong protections like authentication, authorization, and encryption will help to maintain data integrity
APA, Harvard, Vancouver, ISO, and other styles
46

Arora, Amandeep Singh. "Security in Cloud Computing." Don Bosco Institute of Technology Delhi Journal of Research 1, no. 2 (2025): 44–51. https://doi.org/10.48165/dbitdjr.2024.1.02.07.

Full text
Abstract:
The fast-paced growth coupled with the global acceptance of cloud computing has significantly changed how information technology is viewed. The advantages presented in scale, cost and operations have never been experienced before. Nevertheless this change has also created another layer of issues that organizations need to deal with full scale in order to protect their cloud resources against unauthorized access, use and destruction. This long and detailed essay includes review of numerous threats, solutions and best practices regarding cloud computing security. This study is based on an unders
APA, Harvard, Vancouver, ISO, and other styles
47

Shinde, Asharani, Swapna Ghadge, Vinod Alone, and Jaysing Shinde. "Cloud Computing and Security." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 08 (2014): 1048–52. https://doi.org/10.5281/zenodo.14752162.

Full text
Abstract:
This document gives an insight into Cloud Computing giving an overview of key features as well as the detail study of exact working of Cloud computing. Cloud Computing lets you access all your application and documents from anywhere in the world, freeing you from the confines of the desktop thus making it easier for group members in different locations to collaborate. Certainly cloud computing can bring about strategic, transformational and even revolutionary benefits fundamental to future enterprise computing but it also offers immediate and pragmatic opportunities to improve efficiencies tod
APA, Harvard, Vancouver, ISO, and other styles
48

Vedaprada Raghunath. "Security issues analysis based on big data in cloud computing." World Journal of Advanced Research and Reviews 23, no. 3 (2024): 2549–57. http://dx.doi.org/10.30574/wjarr.2024.23.3.2913.

Full text
Abstract:
This study will investigate the security problems that are linked with the Hadoop ecosystem, Big Data, Map Reduce, and cloud computing. The objective of this research is to analyze these concerns. Specifically, the primary emphasis is placed on the security concerns that are linked with big data in cloud computing. Big data applications have a lot to offer organizations, companies, and a broad range of industries, no matter how big or little. There have been issues with Hadoop and cloud computing security, therefore we also look at several possible solutions to these difficulties. The field of
APA, Harvard, Vancouver, ISO, and other styles
49

Vedaprada, Raghunath. "Security issues analysis based on big data in cloud computing." World Journal of Advanced Research and Reviews 23, no. 3 (2024): 2549–57. https://doi.org/10.5281/zenodo.14970341.

Full text
Abstract:
This study will investigate the security problems that are linked with the Hadoop ecosystem, Big Data, Map Reduce, and cloud computing. The objective of this research is to analyze these concerns. Specifically, the primary emphasis is placed on the security concerns that are linked with big data in cloud computing. Big data applications have a lot to offer organizations, companies, and a broad range of industries, no matter how big or little. There have been issues with Hadoop and cloud computing security, therefore we also look at several possible solutions to these difficulties. The field of
APA, Harvard, Vancouver, ISO, and other styles
50

Xie, Hui Juan, Wei She, and Chang Hao Han. "Shamir's Threshold Scheme to Ensure Security in Cloud Computing Services." Applied Mechanics and Materials 543-547 (March 2014): 3632–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3632.

Full text
Abstract:
Cloud computing system preserves the security and privacy of a user's data by replicating data among several clouds and by using the secret sharing approach. It uses the database management system DBMS (data source) to manage and control the operations between the clients and them ulti-clouds inside a cloud service provider [1]. Generally speaking, The Shamir's threshold scheme is suitable for the shares in the cloud computing. The Shamir's threshold scheme as a secret sharing scheme will attract more attention in the cloud computing in future.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!