Navigating Privacy and Security in Cloud Computing

Author: Shilpa Mahajan Recent Trends in Parallel Computing-STM Journals Issn: 2393-8749 Date: 2024-08-21 11:54 Volume: 11 Issue: 02 Keyworde: Cloud computing, privacy and security, multi-factor authentication, information processing, cloud service, intrusion detection systems Full Text PDF Submit Manuscript Journals

Abstract

Keyworde: Cloud computing, privacy and security, multi-factor authentication, information processing, cloud service, intrusion detection systems

Full Text PDF

Refrences:

  1. Xiao Z, Xiao Y. Security and privacy in cloud computing. IEEE Commun Surv Tutor. 2012 Jul 12; 15(2): 843–59.
  2. Chen D, Zhao H. Data security and privacy protection issues in cloud computing. In 2012 IEEE international conference on computer science and electronics engineering. 2012 Mar 23; 1: 647– 651.
  3. Sun Y, Zhang J, Xiong Y, Zhu G. Data security and privacy in cloud computing. Int J Distrib Sens Netw. 2014 Jul 16; 10(7): 190903.
  4. Zhou M, Zhang R, Xie W, Qian W, Zhou A. Security and privacy in cloud computing: A survey. In 2010 IEEE 6th international conference on semantics, knowledge and grids. 2010 Nov 1; 105– 112.
  5. Sambangi S, Gondi L, Aljawarneh S. A feature similarity machine learning model for ddos attack detection in modern network environments for industry 4.0. Comput Electr Eng. 2022 May 1; 100: 107955.
  6. Bansal Y, Mahajan S. Network security breaches: Comprehension and its implications. In: Kaushik K, Bhardwaj A, editors. Perspectives on Ethical Hacking and Penetration Testing. PA, USA: IGI Global; 2023. p. 239–254. DOI: 10.4018/978-1-6684-8218-6.ch010.
  7. Mahajan S. Phishing uniform resource locator detection using machine learning: A step towards secure system. Secur Priv. 2023 Nov; 6(6): e311.
  8. Kshetri N. Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommun Policy. 2013 May 1; 37(4–5): 372–86.
  9. Abdulsalam YS, Hedabou M. Decentralized data integrity scheme for preserving privacy in cloud computing. In 2021 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC). 2021 Jun 18; 607–612.
  10. 14Bajaj P, Arora R, Khurana M, Mahajan S. Cloud security: the future of data storage. In Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021. Singapore: Springer; 2022; 87–98.
  11. Abdulsalam YS, Hedabou M. Security and privacy in cloud computing: technical review. Future Internet. 2021 Dec 27; 14(1): 11.
  12. Bamasoud DM, Al-Dossary AS, Al-Harthy NM, Al-Shomrany RA, Alghamdi GS, Algahmdi RO. Privacy and security issues in cloud computing: A survey paper. In 2021 IEEE international conference on information technology (ICIT). 2021 Jul 14; 387–392.
  13. Sahmim S, Gharsellaoui H. Privacy and security in internet-based computing: cloud computing, internet of things, cloud of things: a review. Procedia Comput Sci. 2017 Jan 1; 112: 1516–22.
  14. Sharma S, Mahajan S. Design and implementation of a security scheme for detecting system vulnerabilities. Int J Comput Netw Inf Secur. 2017 Oct 1; 11(10): 24–32.
If-Else Example
>