2018
DOI: 10.30630/joiv.2.4-2.171
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Cloud Computing Security

Abstract: Cloud computing is a technology that maintain the data and application by using the central remote server with the internet connection. By utilizing cloud computing, user can reduce their costs as they no need to purchase their own hardware and software. However cloud computing still has many issues concerning securities, such as privacy issues, loss of data and stolen of data. Some security issues over cloud services including confidentiality, integrity, availability, privacy and attacks are concerned by the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…Check, ill-advised structure utilize, sneaking around, a web hack, giving up networks assults, and meeting seizure are the data-related threats to the cloud organization [27]. Even though Cloud computing could be seen as yet another peculiarity that could disrupt the Web's strategy, there are still a few things to be cautious about.…”
Section: Overviewmentioning
confidence: 99%
“…Check, ill-advised structure utilize, sneaking around, a web hack, giving up networks assults, and meeting seizure are the data-related threats to the cloud organization [27]. Even though Cloud computing could be seen as yet another peculiarity that could disrupt the Web's strategy, there are still a few things to be cautious about.…”
Section: Overviewmentioning
confidence: 99%
“…In 2018, Marry Teo, et. al., [9] inspected the advancement of conveyed computing so much that to stay aware of the data in like manner application by using the central distant server with the web affiliation. By utilizing dispersed computing, the client can reduce their costs as they not a great explanation to purchase their own gear also programming.…”
Section: Literature Review and Related Workmentioning
confidence: 99%
“…Because of the distributed nature of CC networks, it is easier for attackers to find weaknesses in the system and exploit them to obtain information [15], [16]. When a CC network operates using wireless communications, it becomes more vulnerable to a MiTM attacks.…”
Section: B Related Workmentioning
confidence: 99%