Security and privacy in cloud computing: technical review

YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …

Higher education cloud computing in South Africa: towards understanding trust and adoption issues

K Van Der Schyff, KEM Krauss - South African Computer Journal, 2014 - journals.co.za
This paper sets out to study the views of key stakeholders on the issue of cloud information
security within institutions of Higher Education. A specific focus is on understanding trust and …

[PDF][PDF] Additional authentication and authorization using registered email-ID for cloud computing

AHM Emam - International Journal of Soft Computing and …, 2013 - researchgate.net
Cloud computing is a new computing paradigm that changes the way of information
technology is provided and used. But achieving acceptable level of information security …

[PDF][PDF] Towards information security metrics framework for cloud computing

MI Tariq - International Journal of Cloud Computing and Services …, 2012 - Citeseer
Cloud computing has recently emerged as new computing paradigm which basically aims to
provide customized, reliable, dynamic services over the internet. Cost and security are …

A novel approach for security in cloud computing using hidden markov model and clustering

P Kumar, V Sehgal, K Shah, SSP Shukla… - … World congress on …, 2011 - ieeexplore.ieee.org
In today's fastest growing IT industry Cloud Computing is gaining much more popularity
because the Cloud providers feel that it is very easy to manage the data in the cloud …

[PDF][PDF] Security challenges in cloud computing with more emphasis on trust and privacy

FS Gharehchopogh, S Hashemi - International Journal of Scientific & …, 2012 - Citeseer
Cloud computing is known as the newest technologies in IT field which causes some worries
for consumers and its producers due to its novelty. Looking at its literature, we can see the …

Framework to improve data integrity in multi cloud environment

AS Thakur, PK Gupta - 2014 - ir.juit.ac.in
Cloud computing is a network based environment where resources, information and
software's are shared and provided to the users according to their demands. Though cloud …

Consumer security perceptions and the perceived influence on adopting cloud computing: A quantitative study using the technology acceptance model

KG Paquet - 2013 - search.proquest.com
Cloud computing may provide cost benefits for organizations by eliminating the overhead
costs of software, hardware, and maintenance (eg, license renewals, upgrading software …

[PDF][PDF] Towards Privacy-Preserving Multi-Cloud Identity Management using SOLID

A Cuzzocrea, I Belmerabet - SECRYPT 2024, 21st International …, 2024 - scitepress.org
Digital identity management services are essential for user authentication in Cloud
Computing infrastructures. They allow for flexible access control to services based on the …

Data authentication and integrity verification techniques for trusted/untrusted cloud servers

SK Kavuri, GR Kancherla… - … Conference on Advances …, 2014 - ieeexplore.ieee.org
Third party cloud storage and access permissions play a vital role in security analysis and
user access control. User access control and data verification are the important revolutionary …