2013
DOI: 10.1007/s10207-013-0208-7
|View full text |Cite
|
Sign up to set email alerts
|

Security issues in cloud environments: a survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
149
0
4

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 374 publications
(160 citation statements)
references
References 158 publications
0
149
0
4
Order By: Relevance
“…With all these benefits, the cloud computing also has some security issues [6][7][8][9] that we have discussed in this paper and are also proposing different methods to solve those issues. A cloud acts a black-box to the user, so when the user has no information about who is providing the cloud services, what is cloud provider doing with user's data and what processing is done on cloud.…”
Section: Figure 1 Principal Features Of Cloudmentioning
confidence: 99%
See 1 more Smart Citation
“…With all these benefits, the cloud computing also has some security issues [6][7][8][9] that we have discussed in this paper and are also proposing different methods to solve those issues. A cloud acts a black-box to the user, so when the user has no information about who is providing the cloud services, what is cloud provider doing with user's data and what processing is done on cloud.…”
Section: Figure 1 Principal Features Of Cloudmentioning
confidence: 99%
“…Based on these concerns, the security issues include: service level agreement, data management in cloud, encryption standards, interoperability, access control, reliability and several other issues and challenges. Diogo et al [8] introduced profound security issues in a cloud computing environment and talked about numerous security dangers and assaults conceivable in it. It has categorized the security issues of cloud computing environment in different areas as: software, cloud storage, virtualization, services provided by cloud, network connectivity, access to data on cloud and mutual trust between cloud provider & customer.…”
Section: Related Workmentioning
confidence: 99%
“…A malicious user can employ data recovery techniques to obtain the data of previous users [24,1].This can pose threats to sensitive user data [25].…”
Section: Data Privacy and Integrity:-mentioning
confidence: 99%
“…Security is one of the biggest obstacles that prevent the adoption of cloud computing [1]. Businesses and research are reluctant in shifting the control of digital assets to the third-party service providers [2].Organizations does not enjoy administrative control of cloud services and infrastructure [3].…”
mentioning
confidence: 99%
“…However, calculations in the cloud are associated with losing the control over sent computational models. Due to this, methods for verification and protection of data transferred to the computational cloud are under development at present (Fernandes et al, 2014;Gouglidis et al, 2014).…”
Section: Generator Of Computational Models With Use Of Remote Startinmentioning
confidence: 99%