Cloud security issues and challenges: A survey

A Singh, K Chatterjee - Journal of Network and Computer Applications, 2017 - Elsevier
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …

Security in cloud computing: Opportunities and challenges

M Ali, SU Khan, AV Vasilakos - Information sciences, 2015 - Elsevier
The cloud computing exhibits, remarkable potential to provide cost effective, easy to
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …

A study on data storage security issues in cloud computing

BT Rao - Procedia Computer Science, 2016 - Elsevier
Cloud computing is a revolutionary mechanism that changing way to enterprise hardware
and software design and procurements. Because of cloud simplicity everyone is moving …

A comprehensive survey on internet outages

G Aceto, A Botta, P Marchetta, V Persico… - Journal of Network and …, 2018 - Elsevier
Internet outages are inevitable, frequent, opaque, and expensive. To make things worse,
they are poorly understood, while a deep understanding of them is essential for …

An empirical study of using planning poker for user story estimation

NC Haugen - AGILE 2006 (AGILE'06), 2006 - ieeexplore.ieee.org
Group estimation of user stories is an important part of extreme programming (XP), used for
both planning releases and iterations. Research has shown that although group estimation …

Toward trustworthy cloud service selection: A time-aware approach using interval neutrosophic set

H Ma, Z Hu, K Li, H Zhang - Journal of Parallel and Distributed Computing, 2016 - Elsevier
Cloud services consumers face a critical challenge in selecting trustworthy services from
abundant candidates, and facilitating these choices has become a critical issue in the …

Security as a service using an SLA-based approach via SPECS

M Rak, N Suri, J Luna, D Petcu… - 2013 IEEE 5th …, 2013 - ieeexplore.ieee.org
The cloud offers attractive options to migrate corporate applications, without any implication
for the corporate security manager to manage or to secure physical resources. While this …

Time-aware trustworthiness ranking prediction for cloud services using interval neutrosophic set and ELECTRE

H Ma, H Zhu, Z Hu, K Li, W Tang - Knowledge-Based Systems, 2017 - Elsevier
The imprecise quality of service (QoS) evaluations from consumers may lead to the
inappropriate prediction for the trustworthiness of cloud services in an uncertain cloud …

[PDF][PDF] Enhancing cloud security and privacy: the power and the weakness of the audit trail

RAK Duncan, M Whittington - Cloud Computing 2016, 2016 - aura.abdn.ac.uk
Information security in the cloud presents a serious challenge. We have identified
fundamental weaknesses when undertaking cloud audit, namely the misconceptions …

Comparative study of information security risk assessment models for cloud computing systems

M Jouini, LBA Rabai - Procedia Computer Science, 2016 - Elsevier
This paper reviews the state of the art in cyber security risk assessment of Cloud Computing
systems. We select and examine in detail the quantitative security risk assessment models …