A survey of security issues for cloud computing

MA Khan - Journal of network and computer applications, 2016 - Elsevier
High quality computing services with reduced cost and improved performance have made
cloud computing a popular paradigm. Due to its flexible infrastructure, net centric approach …

A comprehensive overview of privacy and data security for cloud storage

N Akhtar, B Kerim, Y Perwej, A Tiwari… - International Journal of …, 2021 - hal.science
People used to carry their documents about on CDs only a few years ago. Many people
have recently turned to memory sticks. Cloud computing, in this case, refers to the capacity …

Cloud computing security: A survey

IM Khalil, A Khreishah, M Azeem - Computers, 2014 - mdpi.com
Cloud computing is an emerging technology paradigm that migrates current technological
and computing concepts into utility-like solutions similar to electricity and water systems …

[PDF][PDF] Data security, privacy, availability and integrity in cloud computing: issues and current solutions

S Aldossary, W Allen - International Journal of Advanced …, 2016 - pdfs.semanticscholar.org
Cloud computing changed the world around us. Now people are moving their data to the
cloud since data is getting bigger and needs to be accessible from many devices. Therefore …

Using virtual machine allocation policies to defend against co-resident attacks in cloud computing

Y Han, J Chan, T Alpcan… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Cloud computing enables users to consume various IT resources in an on-demand manner,
and with low management overhead. However, customers can face new security risks when …

Sok: New insights into fully homomorphic encryption libraries via standardized benchmarks

C Gouert, D Mouris, N Tsoutsos - Proceedings on privacy …, 2023 - petsymposium.org
Fully homomorphic encryption (FHE) enables arbitrary computation on encrypted data,
allowing users to upload ciphertexts to cloud servers for computation while mitigating …

A game theoretical approach to defend against co-resident attacks in cloud computing: Preventing co-residence using semi-supervised learning

Y Han, T Alpcan, J Chan, C Leckie… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
While cloud computing has facilitated easy and affordable access to IT resources, it has also
introduced a wide range of security risks from almost every layer and component of cloud …

Security games for virtual machine allocation in cloud computing

Y Han, T Alpcan, J Chan, C Leckie - … and Game Theory for Security: 4th …, 2013 - Springer
While cloud computing provides many advantages in accessibility, scalability and cost
efficiency, it also introduces a number of new security risks. This paper concentrates on the …

A study on power side channels on mobile devices

L Yan, Y Guo, X Chen, H Mei - Proceedings of the 7th Asia-Pacific …, 2015 - dl.acm.org
Power side channel is a very important category of side channels, which can be exploited to
steal confidential information from a computing system by analyzing its power consumption …

Classifying malware attacks in IaaS cloud environments

N Rakotondravony, B Taubmann, W Mandarawi… - Journal of Cloud …, 2017 - Springer
In the last few years, research has been motivated to provide a categorization and
classification of security concerns accompanying the growing adaptation of Infrastructure as …