Cloud computing security requirements: A systematic review

I Iankoulova, M Daneva - 2012 Sixth International Conference …, 2012 - ieeexplore.ieee.org
Many publications have dealt with various types of security requirements in cloud computing
but not all types have been explored in sufficient depth. It is also hard to understand which …

Security issues in cloud computing

H Tianfield - 2012 IEEE International Conference on Systems …, 2012 - ieeexplore.ieee.org
This paper presents a comprehensive study on the challenges and issues of security in
cloud computing. We first look into the impacts of the distinctive characteristics of cloud …

Security concerns in cloud computing

PJ Kaur, S Kaushal - … conference on high performance architecture and …, 2011 - Springer
Since inception, the IT industry experienced a variety of natural evolution points, most
marked with rapid change followed by years of internalization and consumption. According …

[KNYGA][B] Aspects of Personal Privacy in Communications-Problems, Technology and Solutions

GM Koien - 2025 - books.google.com
The modern society is rapidly becoming a fully digital society. This has many benefits, but
unfortunately it also means that personal privacy is threatened. The threat does not so much …

Reference deployment models for eliminating user concerns on cloud security

G Zhao, C Rong, MG Jaatun, FE Sandnes - The Journal of …, 2012 - Springer
Cloud computing has become a hot topic both in research and in industry, and when making
decisions on deploying/adopting cloud computing related solutions, security has always …

A framework for data security, privacy, and trust in “consumer internet of things” assemblages in South Africa

M Ngwenya, M Ngoepe - Security and Privacy, 2020 - Wiley Online Library
Abstract The Internet of Things (IoT) brings opportunities and challenges to humankind. IoT
technology makes it possible to connect all of a person's devices to create a smart …

[PDF][PDF] Enabling self auditing for mobile clients in cloud computing

V Saravanan, S Thirukumaran, M Anitha… - International Journal of …, 2013 - ijact.org
Cloud is a rising technology that works over the Internet and it permits the user to urge the
service from anyplace and at any time with pay per usage theme. Cloud computing makes …

The design of a redundant array of independent net-storages for improved confidentiality in cloud computing

MG Jaatun, G Zhao, AV Vasilakos, ÅA Nyre… - Journal of Cloud …, 2012 - Springer
Abstract This article describes how a Redundant Array of Independent Net-storages (RAIN)
can be deployed for confidentiality control in Cloud Computing. The RAIN approach splits …

[PDF][PDF] Multi-authentication for cloud security: A framework

S Kumar, A Ganpati - Int. J. Comput. Sci. Eng. Technol, 2014 - ijcset.com
Cloud computing is a multi-tenant computational paradigm that offers an efficient, elastic and
scalable business model for organizations to adopt various information technology (IT) …

Classifying and filtering users by similarity measures for trust management in cloud environment

FZ Filali, B Yagoubi - Scalable Computing: Practice and Experience, 2015 - scpe.org
Trust represents an important issue for adopting cloud services. A trust management
framework is essentially, about user rating. Hence, correctly addressing user feedback and …