2022
DOI: 10.1155/2022/1791491
|View full text |Cite|
|
Sign up to set email alerts
|

Critical Retrospection of Security Implication in Cloud Computing and Its Forensic Applications

Abstract: Using cloud computing, businesses can adopt IT without incurring a significant upfront cost. The Internet has numerous benefits, but model security remains a concern, which affects cloud embracing negatively. The security challenge gets too difficult underneath data center, while additional dimensions such as model design, multitenancy, elasticity, and the layers dependency stack have been added to the problem scope. We present a thorough examination of the cloud security challenge in this article. We looked a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 63 publications
0
5
0
Order By: Relevance
“…In addition to optically-controlled PCM, these endurance management techniques could also be applied to optically-controlled PCs. It can be used in the Internet of Things (IoT) too [72][73][74][75][76].…”
Section: Related Workmentioning
confidence: 99%
“…In addition to optically-controlled PCM, these endurance management techniques could also be applied to optically-controlled PCs. It can be used in the Internet of Things (IoT) too [72][73][74][75][76].…”
Section: Related Workmentioning
confidence: 99%
“…These practices are vital for safeguarding sensitive data, upholding trust in the digital ecosystem, and mitigating the potential fallout of data breaches in cloud computing environments. Cloud forensics analyzes logs, access controls, and user activities to identify vulnerabilities in cloud infrastructure that lead to data breaches [ 14 ]. It helps organizations enhance security and recover compromised or deleted data in complex environments [ 15 ].…”
Section: Introductionmentioning
confidence: 99%
“…However, experts face technological and legal challenges in cross-border data governance, necessitating collaboration with cloud service providers. Cloud forensics is crucial in investigating incidents, preserving evidence, mitigating fallout, safeguarding sensitive data, and upholding trust in the digital ecosystem [ 14 , 15 ].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, cloud solutions can be classified into four deployment models: public, private, community, and hybrid, depending on the system's requirements. The key benefits of cloud computing include its flexibility, accessibility, and capacity when compared to traditional online computing and storage methods [5]. However, cloud computing is also associated with various security concerns [6].…”
Section: Introductionmentioning
confidence: 99%