2020 8th International Symposium on Digital Forensics and Security (ISDFS) 2020
DOI: 10.1109/isdfs49300.2020.9116266
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Computing Security Challenges and Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…In this day and age, everyone can benefit from using modern cybersecurity software. They want to educate the general public about the relevance of cybersecurity, raise attention to newly identified vulnerabilities, and give support for open-source software toolkits (Balani & Varol, 2020).…”
Section: Benefits Of Cyber-securitymentioning
confidence: 99%
“…In this day and age, everyone can benefit from using modern cybersecurity software. They want to educate the general public about the relevance of cybersecurity, raise attention to newly identified vulnerabilities, and give support for open-source software toolkits (Balani & Varol, 2020).…”
Section: Benefits Of Cyber-securitymentioning
confidence: 99%
“…They are attacks, countermeasures and their opportunities [10]. (Balani & Varol, 2020) had presented a survey for the challenges and threats that faced both users and providers of clouds. They listed some of the most important security issues in cloud computing.…”
Section: The Related Workmentioning
confidence: 99%
“…(Abdulateef et al, 2020) presented a survey in which machine learning algorithm had been implemented to enhance cloud security. The authors present advantages and dis advantages of each listed paper but no comparison had been presented [12]. (Tariq, et al, 2020) had proposed some important countermeasures to evaluate the risk and challenges of the deep learning-based models that may be vulnerable for several attacks in cloud computing [13].…”
Section: The Related Workmentioning
confidence: 99%
“…Since cloud computing environments can be virtually accessed from anywhere, smart city managers should be concerned with security issues related to cloud applications. In the same way that fog nodes are subject to security threats like phishing and DDoS attacks (Guideline 3), a cloud environment also has security concerns [Almorsy et al 2010;Balani and Varol 2020]. Solutions for issues related to security in a cloud computing environment are presented in [Singh et al 2016].…”
Section: Guideline 8 Multidimensional Modelling Of Data Contained In the Cloud Computing Layermentioning
confidence: 99%