On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Cloud security issues and challenges: A survey

A Singh, K Chatterjee - Journal of Network and Computer Applications, 2017 - Elsevier
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …

Security in cloud computing: Opportunities and challenges

M Ali, SU Khan, AV Vasilakos - Information sciences, 2015 - Elsevier
The cloud computing exhibits, remarkable potential to provide cost effective, easy to
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …

The security and privacy of mobile-edge computing: An artificial intelligence perspective

C Wang, Z Yuan, P Zhou, Z Xu, R Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Mobile-edge computing (MEC) is a new computing paradigm that enables cloud computing
and information technology (IT) services to be delivered at the network's edge. By shifting …

Security issues in cloud environments: a survey

DAB Fernandes, LFB Soares, JV Gomes… - International journal of …, 2014 - Springer
In the last few years, the appealing features of cloud computing have been fueling the
integration of cloud environments in the industry, which has been consequently motivating …

Security and privacy in cloud computing

Z **ao, Y **ao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …

Data center network virtualization: A survey

MF Bari, R Boutaba, R Esteves… - … surveys & tutorials, 2012 - ieeexplore.ieee.org
With the growth of data volumes and variety of Internet applications, data centers (DCs) have
become an efficient and promising infrastructure for supporting data storage, and providing …

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service

S Iqbal, MLM Kiah, B Dhaghighi, M Hussain… - Journal of Network and …, 2016 - Elsevier
Major provisioning of cloud computing is mainly delivered via Software as a Service,
Platform as a Service and Infrastructure as a Service. However, these service delivery …

Health care in the cyberspace: Medical cyber-physical system and digital twin challenges

JI Jimenez, H Jahankhani, S Kendzierskyj - Digital twin technologies and …, 2020 - Springer
Abstract Cyber-Physical Systems and Digital Twins are commonly used today in the
industrial sector, and the healthcare sector is keen to implement these technological …

Using virtual machine allocation policies to defend against co-resident attacks in cloud computing

Y Han, J Chan, T Alpcan… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Cloud computing enables users to consume various IT resources in an on-demand manner,
and with low management overhead. However, customers can face new security risks when …