72
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Review on security issues and solutions in cloud computing

, , , &

References

  • Bello, Sururah A., et al. “Cloud computing in construction industry: Use cases, benefits and challenges.” Automation in Construction 122 (2021): 103441. doi: 10.1016/j.autcon.2020.103441
  • Sunyaev, Ali. “Cloud computing.” Internet computing. Springer, Cham, 2020. 195-236.
  • Basu, Srijita, et al. “Cloud computing security challenges & solutions-A survey.” 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2018.
  • Alouffi, Bader, et al. “A systematic literature review on cloud computing security: Threats and mitigation strategies.” IEEE Access 9 (2021): 57792-57807. doi: 10.1109/ACCESS.2021.3073203
  • Montasari, Reza, et al. “Cloud computing security: Hardware-based attacks and countermeasures.” Digital Forensic Investigation of Internet of Things (IoT) Devices. Springer, Cham, 2021. 155-167.
  • Vinoth, S., et al. “Application of cloud computing in banking and e-commerce and related security threats.” Materials Today: Proceedings 51 (2022): 2172-2175.
  • Atieh, Ali T. “Assuring the Optimum Security Level for Network, Physical and Cloud Infrastructure.” ScienceOpen Preprints (2021).
  • Bharadwaj, Deepak R., Anamika Bhattacharya, and Manivannan Chakkaravarthy. “Cloud threat defense–A threat protection and security compliance solution.” 2018 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM). IEEE, 2018.
  • Thabit, Fursan, Sharaf Alhomdy, and Sudhir Jagtap. “A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions.” International Journal of Intelligent Networks 2 (2021): 18-33. doi: 10.1016/j.ijin.2021.03.001
  • Timoshenko, Denis, et al. “Large Crowdcollected Facial Anti-Spoofing Dataset.” 2019 Computer Science and Information Technologies (CSIT) (2019): 123-126.
  • Sharma, Shilpa, et al. “Hybrid HOG-SVM encrypted face detection and recognition model.” Journal of Discrete Mathematical Sciences and Cryptography 25.1 (2022): 205-218. doi: 10.1080/09720529.2021.2014141
  • dataset, link: https://www.kaggle.com/code/faber24/face-anti-spoofing-detection-using-mobilenetv2/data, last accessed on June 2022.
  • Demšar, Janez, et al. “Orange: data mining toolbox in Python.” The Journal of Machine Learning Research 14.1 (2013): 2349-2353.
  • Gupta, Awaneesh, et al. “Role of cloud computing in management and education.” Materials Today: Proceedings (2021).
  • Chyad, Haitham Salman, Raniah Ali Mustafa, and Dena Nadir George. “Cloud resources modelling using smart cloud management.” Bulletin of Electrical Engineering and Informatics 11.2 (2022): 1134-1142. doi: 10.11591/eei.v11i2.3286
  • Snehi, Manish, and Abhinav Bhandari. “Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks.” Computer Science Review 40 (2021): 100371. doi: 10.1016/j.cosrev.2021.100371

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.