2020
DOI: 10.35741/issn.0258-2724.55.1.11
|View full text |Cite
|
Sign up to set email alerts
|

Integrity and Security in Cloud Computing Environment: A Review

Abstract: Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Governments have been compelled to enact new laws and regulations in response to the rising and persistent security vulnerabilities, which have made cybersecurity and privacy issues a top priority [11][12]. Small-and large-scale businesses, as well as the public and private industries, are required to adhere to regulatory guidelines and regulations to protect digital assets' accessibility, confidentiality, and integrity [13][14]. Infractions of these security breaches carry severe consequences.…”
Section: Security Threats In Cloud Computingmentioning
confidence: 99%
“…Governments have been compelled to enact new laws and regulations in response to the rising and persistent security vulnerabilities, which have made cybersecurity and privacy issues a top priority [11][12]. Small-and large-scale businesses, as well as the public and private industries, are required to adhere to regulatory guidelines and regulations to protect digital assets' accessibility, confidentiality, and integrity [13][14]. Infractions of these security breaches carry severe consequences.…”
Section: Security Threats In Cloud Computingmentioning
confidence: 99%
“…The security risks and vulnerabilities in MCC depend upon the choice of deployment and delivery models (Ramachandra et al, 2017). The three major deployment models are: public cloud, private cloud and hybrid cloud (Abdul-Jabbar et al, 2020). Public cloud offers the cloud infrastructure and other computing resources to many customers based on self-services and on-demand pricing scheme; private cloud allocates the cloud resources to a single or a group of organizations in a dedicated manner (Gallaugher, 2021); and hybrid cloud is a combination of two or more cloud deployment models (Sen, 2015).…”
Section: User's Attitude Toward Deployment Model Related Security Issuesmentioning
confidence: 99%
“…The security risks and vulnerabilities in MCC depend upon the choice of deployment and delivery models (Ramachandra et al , 2017). The three major deployment models are: public cloud, private cloud and hybrid cloud (Abdul-Jabbar et al , 2020).…”
Section: Introductionmentioning
confidence: 99%
“…The protection of privacy and security of data is paramount by the use of cloud services. There are several works done in this area [3], [4], [5], [6], [11]. Templates, approaches, and techniques are proposed in order to protect the data.…”
Section: Related Workmentioning
confidence: 99%