Cloud security issues and challenges: A survey

A Singh, K Chatterjee - Journal of Network and Computer Applications, 2017 - Elsevier
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …

[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

OI Abiodun, M Alawida, AE Omolara… - Journal of King Saud …, 2022 - Elsevier
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …

Security issues in cloud environments: a survey

DAB Fernandes, LFB Soares, JV Gomes… - International journal of …, 2014 - Springer
In the last few years, the appealing features of cloud computing have been fueling the
integration of cloud environments in the industry, which has been consequently motivating …

On technical security issues in cloud computing

M Jensen, J Schwenk, N Gruschka… - 2009 IEEE international …, 2009 - ieeexplore.ieee.org
The Cloud Computing concept offers dynamically scalable resources provisioned as a
service over the Internet. Economic benefits are the main driver for the Cloud, since it …

Attack surfaces: A taxonomy for attacks on cloud services

N Gruschka, M Jensen - 2010 IEEE 3rd international …, 2010 - ieeexplore.ieee.org
The new paradigm of cloud computing poses severe security risks to its adopters. In order to
cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud …

A survey and taxonomy of DoS attacks in cloud computing

M Masdari, M Jalali - Security and Communication Networks, 2016 - Wiley Online Library
Abstract Denial‐of‐service (DoS) attacks are one of the major security challenges in the
emerging cloud computing models. Currently, numerous types of DoS attacks are conducted …

A survey of attacks on web services: Classification and countermeasures

M Jensen, N Gruschka, R Herkenhöner - Computer Science-Research …, 2009 - Springer
Being regarded as the new paradigm for Internet communication, Web Services have
introduced a large number of new standards and technologies. Though founding on …

Cloud computing security considerations

A Tripathi, A Mishra - 2011 IEEE International Conference on …, 2011 - ieeexplore.ieee.org
Cloud computing is a new way of delivering computing resources and is not a new
technology. It is an internet based service delivery model which provides internet based …

Intelligent detection and recovery from cyberattacks for small and medium-sized enterprises

MÁ López, JML Enríquez, M López, CMA Jiménez… - IJIMAI, 2020 - dialnet.unirioja.es
Cyberattacks threaten continuously computer security in companies. These attacks evolve
everyday, being more and more sophisticated and robust. In addition, they take advantage …

AC/sup 2/-continuous B-spline quaternion curve interpolating a given sequence of solid orientations

MJ Kim, MS Kim, SY Shin - Proceedings Computer Animation' …, 1995 - ieeexplore.ieee.org
An algorithm is presented that constructs a C/sup 2/-continuous B-spline quaternion curve
which interpolates a given sequence of unit quaternions on the rotation group SO (3). The …