2013
DOI: 10.11591/closer.v2i2.1840
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Trust Aspects in Cloud Computing Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(18 citation statements)
references
References 14 publications
0
18
0
Order By: Relevance
“…Specifically, cloud computing's architecture may generate new security issues such as data leakage, virtualization, vulnerability and hypervisor vulnerability (Gonzalez et al, 2012). CS is complicated by the multi-tenancy of the virtualized resources (DFD, 2013), with data owners not necessarily knowing the location or reliability of the data hosts (Sarwar & Khan, 2013). Other major issues relate to: transmission, and availability (Mahmood, 2011); malicious insiders, outside attacks, and service disruptions (Behl, 2011); data protection, disaster recovery, and business continuity (DFD, 2013).…”
Section: Cloud Securitymentioning
confidence: 99%
“…Specifically, cloud computing's architecture may generate new security issues such as data leakage, virtualization, vulnerability and hypervisor vulnerability (Gonzalez et al, 2012). CS is complicated by the multi-tenancy of the virtualized resources (DFD, 2013), with data owners not necessarily knowing the location or reliability of the data hosts (Sarwar & Khan, 2013). Other major issues relate to: transmission, and availability (Mahmood, 2011); malicious insiders, outside attacks, and service disruptions (Behl, 2011); data protection, disaster recovery, and business continuity (DFD, 2013).…”
Section: Cloud Securitymentioning
confidence: 99%
“…Security is one of the concerns about Cloud computing that continues to delay adoption (Jamwal, Sambyal & Sambyal, 2011). Sarwar and Khan (2013) found that security is the biggest issue in Cloud computing as, while utilising storage service in a remote location, the consumers are generally unaware of what happens to their data. According to Forrester research, Sahandi et al (2012) reported that security concerns are the most commonly cited reason why enterprises are not interested in SaaS Cloud.…”
Section: Cloud Securitymentioning
confidence: 99%
“…In [30], Bashir and Khan discuss triaging methodologies being used for live digital forensic analysis. References [31][32][33][34][35][36][37][38][39][40][41][42][43][44][45][46][47] Gray scale and binary image.…”
Section: Literature Reviewmentioning
confidence: 99%