Corpus ID: 17007397

STATE OF THE ART SURVEY ON SECURITY ISSUE IN CLOUD COMPUTING ARCHITECTURES, APPROACHES AND METHODS

@article{Aldeen2015STATEOT,
  title={STATE OF THE ART SURVEY ON SECURITY ISSUE IN CLOUD COMPUTING ARCHITECTURES, APPROACHES AND METHODS},
  author={Y. A. A. S. Aldeen and M. Salleh and M. Razzaque},
  journal={Journal of theoretical and applied information technology},
  year={2015},
  volume={75},
  pages={53-61}
}
The development of cloud computing has revolutionized in how the computing and storage are utilized remotely. It has grown from being hopeful business concept to one of the fast growing segments of the IT manufacturing. It has become attractive to businesses and organizations. Although of all the benefits of the cloud, enterprise customers are still unwilling to position their business in the cloud. Security and privacy are the main issues which decrease the growth of cloud computing and… Expand
Data Alteration: A Better Approach to Securing Cloud Data with Encryption
TLDR
This paper proposes a new approach that combines the strengths of both steganography and cryptography called Data Alteration, which aims to hide the data by modifying it completely as it remains readable, meaningful and therefore shows no suspicions to malicious cloud providers and pirates. Expand
Security Governance in Multi-cloud Environment: A Systematic Mapping Study
TLDR
This paper aims to categorize the existing works related to security governance in multi-cloud environments by applying a systematic mapping study methodology in order to identify trends and future directions. Expand
Intelligent multi agent system based solution for data protection in the cloud
TLDR
The architecture aims to use adaptive agents able to predict alerts, make decisions and block any intrusion, and is based on an encryption process before storage, while an intelligent multi agent system was designed and simulated to optimize the exploration of the data in a Cloud environment. Expand
AUTHENTICATION MECHANISM FOR CLOUD NETWORK AND ITS FITNESS WITH QUANTUM KEY DISTRIBUTION PROTOCOL: A SURVEY
Communication in a huge network such as in cloud infrastructure is vast in demand. Almost all classified information transferred via the communication channel. Most types of attack can cause theExpand
Digitization in wood supply - A review on how Industry 4.0 will change the forest value chain
TLDR
This article identifies general trends towards a smart wood supply chain and concrete I 4.0 application examples, which are already in practical use or still in the stage of research and development, and gives an extensive overview of technological developments, applications and challenges that wood supply will face in the future. Expand

References

SHOWING 1-10 OF 37 REFERENCES
State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions
TLDR
A better understanding of the security challenges of cloud computing is provided to identify approaches and solutions which have been proposed and adopted by the cloud service industry. Expand
A survey on security issues in service delivery models of cloud computing
TLDR
A survey of the different security risks that pose a threat to the cloud is presented and a new model targeting at improving features of an existing model must not risk or threaten other important features of the current model. Expand
Security issues in cloud environments: a survey
TLDR
This paper surveys the works on cloud security issues, making a comprehensive review of the literature on the subject and proposes a taxonomy for their classification, addressing several key topics, namely vulnerabilities, threats, and attacks. Expand
A Survey on Cloud Computing Security
TLDR
Development of many acquired technologies and advances to computing into something different are summarized in a "Cloud Computing" or "cloud" term which detaches basic infrastructure from application. Expand
An analysis of security issues for cloud computing
TLDR
This work identifies the main vulnerabilities in this kind of systems and the most important threats found in the literature related to Cloud Computing and its environment as well as to identify and relate vulnerabilities and threats with possible solutions. Expand
A security aspects in cloud computing
TLDR
The core concept of secured cloud computing is proposed, which is a cloud computing based on separate encryption and decryption services from the storage service and how they can be avoided. Expand
Security Issues on Cloud Computing
TLDR
This paper focuses on various security issues arising from the usage of Cloud services and especially by the rapid development of Cloud computing arena, and discusses basic security model followed by various High Level Security threats in the industry. Expand
Addressing cloud computing security issues
TLDR
This paper proposes introducing a Trusted Third Party, tasked with assuring specific security characteristics within a cloud environment, and presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained. Expand
Cloud Security Issues
TLDR
Some security issues that have to be included in service level agreements (SLA) are put forward to help some of the enterprises to look forward in using the cloud services. Expand
Beyond lightning: A survey on security challenges in cloud computing
TLDR
It is emphasized that although there are many technological approaches that can improve cloud security, there are currently no one-size-fits-all solutions, and future work has to tackle challenges such as service level agreements for security, as well as holistic mechanisms for ensuring accountability in the cloud. Expand
...
1
2
3
4
...