2021
DOI: 10.3390/fi14010011
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy in Cloud Computing: Technical Review

Abstract: Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of the pay-as-you-go price model. However, outsourcing information and business applications to the cloud or a third party raises security and privacy concerns, which have become critical in adopting cloud implementation and services. Researchers and affected organ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
32
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 65 publications
(32 citation statements)
references
References 88 publications
(114 reference statements)
0
32
0
Order By: Relevance
“…Some of the issues raised include the need for end-to-end deep learning models, improved run time, lower computing costs, and flexibility. The authors proposed contemporary technologies like edge computing, fog computing and cloud computing [26][27][28], federated learning, the GAN method, and IoT [7] as problem-solving technologies. As we have seen, there are a variety of approaches utilized in medical imaging, particularly on MRI pictures of brain tumors.…”
Section: Related Workmentioning
confidence: 99%
“…Some of the issues raised include the need for end-to-end deep learning models, improved run time, lower computing costs, and flexibility. The authors proposed contemporary technologies like edge computing, fog computing and cloud computing [26][27][28], federated learning, the GAN method, and IoT [7] as problem-solving technologies. As we have seen, there are a variety of approaches utilized in medical imaging, particularly on MRI pictures of brain tumors.…”
Section: Related Workmentioning
confidence: 99%
“…The procedure supplies a certain-time dossier study from sensors established in crops and produces a result for the grower, which is necessary for crop progress listening and saves the grower's time and strength. The concept of security and privacy in cloud computing can be implemented to design prototype for cloud layer devices [ 15 17 ]. and the demonstration of space time coding for MDL mitigation and capacity enhancement of FTS gives right direction for transmission criteria [ 18 20 ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Computational and Mathematical Methods in Medicine security and privacy in cloud computing can be implemented to design prototype for cloud layer devices [15][16][17]. and the demonstration of space time coding for MDL mitigation and capacity enhancement of FTS gives right direction for transmission criteria [18][19][20].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Cloud-based systems, similarly to traditional data servers, present threats that, if not managed properly, can impact data integrity and security. The first model is a collection of threats known collectively as STRIDE [ 4 ], which stands for Spoofing identity, Tampering with data, Repudiation threats, Information disclosure, Denial of Service, and Elevation of privileges. The significance of the STRIDE technique in studying the security of cloud systems has been emphasised in investigations on the resilience of cloud systems.…”
Section: Related Workmentioning
confidence: 99%