2020
DOI: 10.1049/iet-com.2019.0040
|View full text |Cite
|
Sign up to set email alerts
|

Cyber security threats, challenges and defence mechanisms in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(16 citation statements)
references
References 34 publications
0
16
0
Order By: Relevance
“…A literature review has been conducted to explain the modern state-of-the-art automated web application security scanners using dynamic and static analysis. It has also intended to explain the primary issues of the subject and summarize the essential concepts of existing challenges and attacks, such as SQL injection attacks, OS command Injection, Cross-Site Scripting, and directory traversal [9][10][11]. The advanced development methods include specific frameworks and libraries for regulating effective and quick approaches to improve market requirements.…”
Section: Related Workmentioning
confidence: 99%
“…A literature review has been conducted to explain the modern state-of-the-art automated web application security scanners using dynamic and static analysis. It has also intended to explain the primary issues of the subject and summarize the essential concepts of existing challenges and attacks, such as SQL injection attacks, OS command Injection, Cross-Site Scripting, and directory traversal [9][10][11]. The advanced development methods include specific frameworks and libraries for regulating effective and quick approaches to improve market requirements.…”
Section: Related Workmentioning
confidence: 99%
“…Diffie-Hellman guarantees privacy between two parties who have no prior information about one another and builds up a shared secret key over the web. 25 This calculation explicitly utilizes time and space to settle on the choice of the right calculation depending on parameters like the size of the file, encryption computation time, encoding computing time. 26 A hybrid system of AES, RC6, Blowfish, and BRA is implemented, which provides high security and low delay using cryptography and stenography techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Data breaches are a security event in which sensitive data is copied and used in illegal projects, and this data is used by plundering and exploiting by an unauthorized person, and sensitive data may be personal information, trade secrets, intellectual information, personal inventions, and Other information that revolves around the same person only, without the intervention of a third party, and these data may be related in several fields such as education, industry, health information, financial services, and others [20].…”
Section: Data Breaches In Cloud Computingmentioning
confidence: 99%
“…It is important to develop information security in those agencies that contain information on a large number of people, which may cause a disaster in the event of a security failure in their system, so there must be many security precautions [20][21][22][23][24].…”
Section: Data Breaches In Cloud Computingmentioning
confidence: 99%