2019
DOI: 10.11591/ijict.v8i3.pp162-183
|View full text |Cite
|
Sign up to set email alerts
|

Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks

Abstract: The emergence of cloud computing has changed perception of all regarding software delivery, development models and infrastructure. Cloud computing has a potential of providing elastic, easily manageable, powerful and cost effective solutions. The rapid transition to cloud computing has fueled concerns on the security issues. The migration of the user’s data and applications in a shared environment of a cloud, where there is a collocation of several users increases security related concerns. Several research ef… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 24 publications
0
7
0
Order By: Relevance
“…SaaS reusability metrics and quality attributes have been explored by Samir and Darwish [7]. Cloud Computing detailed services study i.e., latest trends, challenges associated and solution related to security has been presented by Hassan et al [8].…”
Section: Related Workmentioning
confidence: 99%
“…SaaS reusability metrics and quality attributes have been explored by Samir and Darwish [7]. Cloud Computing detailed services study i.e., latest trends, challenges associated and solution related to security has been presented by Hassan et al [8].…”
Section: Related Workmentioning
confidence: 99%
“…The risks and issues associated with cloud security in cloud computing are not well recognized even today [52] 129 built, it should be determined that who can enter data in the cloud, the resource modifications should be tracked to identify the abnormal behaviors, orchestration tools should be secured and network analysis of both eastwest and north-south traffic as a potential signal of protecting cloud infrastructure deployments should be added. The security threats are out of scope of this paper and a more detailed discussion on Cloud Security is [3]. Some of the important security threats are discussed in subsequent section.…”
Section: Cloud Securitymentioning
confidence: 99%
“…There are many security threats [3] linked to hosting numerous users and information storage in cloud computing, that can be mitigated by strong security mechanisms of cloud computing to ensure the information isolation of users. But this becomes even more complicated.…”
Section: Introductionmentioning
confidence: 99%
“…The application serves as facilities on the internet with the hardware and system software work in the data centers for storage and other applications. People are adopting new technology to achieve their required goals [1]. Cloud computing allows people to get a huge amount of data at high speed and large memory storage.…”
Section: Introductionmentioning
confidence: 99%