References |
: |
[1]Kumar R, Bhatia MP. A systematic review of the security in cloud computing: data integrity, confidentiality and availability. In international conference on computing, power and communication technologies 2020 (pp. 334-7). IEEE.
|
[Crossref] |
[Google Scholar] |
[2]Kumar R, Goyal R. On cloud security requirements, threats, vulnerabilities and countermeasures: a survey. Computer Science Review. 2019; 33:1-48.
|
[Google Scholar] |
[3]Sun PJ. Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and Computer Applications. 2020:102642.
|
[Google Scholar] |
[4]Sasubilli SM, Dubey AK, Kumar A. A computational and analytical approach for cloud computing security with user data management. In international conference on advances in computing and communication engineering 2020 (pp. 1-5). IEEE.
|
[Crossref] |
[Google Scholar] |
[5]Divya J, Shivagami S. A study of Secure cryptographic based Hardware security module in a cloud environment. In international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) 2020 (pp. 1273-9). IEEE.
|
[Crossref] |
[Google Scholar] |
[6]Dubey AK, Dubey AK, Namdev M, Shrivastava SS. Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment. In CSI sixth international conference on software engineering 2012 (pp. 1-8). IEEE.
|
[Crossref] |
[Google Scholar] |
[7]Zheng X, Martin P, Brohman K, Da Xu L. Cloudqual: A quality model for cloud services. IEEE Transactions on Industrial Informatics. 2014; 10(2):1527-36.
|
[Crossref] |
[Google Scholar] |
[8]Jagli D, Purohit S, Chandra NS. SaaS CloudQual:a Quality Model for Evaluating Software as a Service on the cloud computing environment. In innovations in computer science and engineering 2017 (pp. 73-80). Springer, Singapore.
|
[Crossref] |
[Google Scholar] |
[9]Sasubilli SM, Dubey AK, Kumar A. Hybrid security analysis based on intelligent adaptive learning in Big Data. In international conference on advances in computing and communication engineering 2020 (pp. 1-5). IEEE.
|
[Crossref] |
[Google Scholar] |
[10]Singh A, Chatterjee K. Cloud security issues and challenges: a survey. Journal of Network and Computer Applications. 2017; 79:88-115.
|
[Google Scholar] |
[11]Choi SW, Kim SD. A quality model for evaluating reusability of services in SOA. In conference on e-commerce technology and the fifth IEEE conference on enterprise computing, e-commerce and e-services 2008 (pp. 293-8). IEEE.
|
[Crossref] |
[Google Scholar] |
[12]Choudhary AR. Baseline requirements and architecture for cloud computing services. International Journal of Advanced Computer Research. 2012; 2(7):1-7.
|
[Google Scholar] |
[13]Luo HY, Lv P, Liu LZ, Yang X. Enterprises trust comprehensive evaluation based on fussy rough AHP in cloud computing. J Shandong Univ (Nat Sci). 2014; 49:111-7.
|
[Google Scholar] |
[14]Alotaibi MB. Antecedents of software-as-a-service (SaaS) adoption: a structural equation model. International Journal of Advanced Computer Research. 2016; 6(25):114-29.
|
[Crossref] |
[Google Scholar] |
[15]Bhupendra Kumar, Jayshree Boaddh. A meta-analysis on secure cloud computing. International Journal of Advanced Technology and Engineering Exploration. 2016; 3(15): 15-20.
|
[Crossref] |
[Google Scholar] |
[16]Zisman A, Spanoudakis G, Dooley J. A framework for dynamic service discovery. In 2008 23rd IEEE/ACM International conference on automated software engineering 2008 (pp. 158-67). IEEE.
|
[Crossref] |
[Google Scholar] |
[17]Soni A, Hasan M. Pricing schemes in cloud computing: a review. International Journal of Advanced Computer Research. 2017; 7(29):60-70.
|
[Crossref] |
[Google Scholar] |
[18]https://www.globaldots.com/cloud-computing-types-of-cloud/. Accessed 26 October 2020.
|
[19]Shrimali B, Bhadka H, Patel H. A fuzzy-based approach to evaluate multi-objective optimization for resource allocation in cloud. International Journal of Advanced Technology and Engineering Exploration. 2018; 5(43):140-50.
|
[Crossref] |
[Google Scholar] |
[20]Kalangi RR, Rao MC. A novel multi-user fingerprint minutiae based encryption and integrity verification for cloud data. International Journal of Advanced Computer Research. 2018; 8(37):161-70.
|
[Crossref] |
[Google Scholar] |
[21]Ismail UM, Islam S. A unified framework for cloud security transparency and audit. Journal of Information Security and Applications. 2020; 54:102594.
|
[Google Scholar] |
[22]Ahamad D, Hameed SA, Akhtar M. A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. Journal of King Saud University-Computer and Information Sciences. 2020.
|
[Google Scholar] |
[23]Prasath R, Santhosh GT, Ratchnayaraj IA, Jemiline E. The security in web application of cloud and IoT service. Materials Today: Proceedings. 2020.
|
[Google Scholar] |
[24]Prajapati P, Shah P. Review on secure data deduplication: cloud storage security issue. Journal of King Saud University-Computer and Information Sciences. 2020.
|
[Google Scholar] |
[25]Kelf S. The security risks created by cloud migration and how to overcome them. Network Security. 2020; 2020(4):14-6.
|
[Google Scholar] |
[26]Fan Y, Zhao G, Shang W, Shang J, Lin W, Wang Z. A preliminary design for authenticity of IoT Big data in cloud computing. In international conference on computer communications and networks 2020 (pp. 1-2). IEEE.
|
[Crossref] |
[Google Scholar] |
[27]Mondal A, Paul S, Goswami RT, Nath S. Cloud computing security issues & challenges: a review. In international conference on computer communication and informatics 2020 (pp. 1-5). IEEE.
|
[Crossref] |
[Google Scholar] |
[28]Mohiuddin I, Almogren A. Security challenges and strategies for the IoT in cloud computing. In international conference on information and communication systems 2020 (pp. 367-72). IEEE.
|
[Crossref] |
[Google Scholar] |
[29]Saran P, Rajesh D, Pamnani H, Kumar S, Sai TH, Shridevi S. A survey on health care facilities by cloud computing. In international conference on emerging trends in information technology and engineering 2020 (pp. 1-5). IEEE.
|
[Crossref] |
[Google Scholar] |
[30]Chadwick DW, Fan W, Costantino G, De Lemos R, Di Cerbo F, Herwono I, et al. A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future Generation Computer Systems. 2020; 102:710-22.
|
[Google Scholar] |
[31]Jia H, Liu X, Di X, Qi H, Cong L, Li J, Yang H. Security strategy for virtual machine allocation in cloud computing. Procedia Computer Science. 2019; 147:140-4.
|
[Google Scholar] |
[32]Namasudra S, Devi D, Kadry S, Sundarasekar R, Shanthini A. Towards DNA based data security in the cloud computing environment. Computer Communications. 2020; 151:539-47.
|
[Google Scholar] |
[33]Toumi H, Fagroud FZ, Zakouni A, Talea M. Implementing Hy-IDS, mobiles agents and virtual firewall to enhance the security in IaaS Cloud. Procedia Computer Science. 2019; 160:819-24.
|
[Google Scholar] |
[34]Kayed A, Omar S. Periodical key change for cloud mutable security protocol. Microprocessors and Microsystems. 2019; 69:152-8.
|
[Google Scholar] |
|