Communications and Network

Communications and Network

ISSN Print: 1949-2421
ISSN Online: 1947-3826
www.scirp.org/journal/cn
E-mail: cn@scirp.org
"Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review"
written by Osama Harfoushi, Bader Alfawwaz, Nazeeh A. Ghatasheh, Ruba Obiedat, Mua’ad M. Abu-Faraj, Hossam Faris,
published by Communications and Network, Vol.6 No.1, 2014
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Cloud Computing Applications in Social Work and Education
Handbook of Research on Cyber Approaches to …, 2022
[2] A cloud business intelligence security evaluation framework for small and medium enterprises
2021
[3] Analyzing and evaluating critical challenges and practices for software vendor organizations to secure big data on cloud computing: An AHP-based systematic …
IEEE …, 2021
[4] A review paper on hypervisor and virtual machine security
Journal of Physics: Conference …, 2021
[5] Identification and prioritization of security challenges of big data on cloud computing based on SLR: A fuzzy‐TOPSIS analysis approach
Journal of Software …, 2021
[6] Cloud Computing: Security Issues and Challenges
2021
[7] Skills and Competences for Utilization of Web Storage Technology (WST) Platform for Academic Activities by Faculty Members in Faculty of Education, Ahmadu Bello …
2020
[8] A Prototype for Data Integrity in Cloud Environment
2020
[9] SECURITY FLAWS AND RISKS IN CLOUD COMPUTING SERVICE: A QUALITATIVE CASE STUDY
2019
[10] Analytics on real time security attacks in healthcare, retail and banking applications in the cloud
2019
[11] A brief review: security issues in cloud computing and their solutions
2019
[12] A Privacy Preserved Scheme for Data Verification and Integrity Protocol
2019
[13] A brief review: security issues in cloud computing and their solutions.
2019
[14] Data Access and security in Cloud integrated IoT
2019
[15] Analysis of Several Data Security Issues in Cloud Computing with Cryptographic Algorithms
International Journal of Scientific Research in Computer Science Applications and Management Studies, 2019
[16] SIGURIA DHE PRIVATËSIA NË SEKTORIN BANKAR QË PËRDORIN SHËRBIME TË BAZUARA NË CLOUD: SFIDAT DHE KONTROLLET
2019
[17] Efficient Online Data Storage Over Cloud Using Enhanced Homomorphic Encryption With Redundancy Handling
Think India Journal, 2019
[18] A Survey of Techniques Used For Dynamic Replication and Migration of Data In Cloud
Think India Journal, 2019
[19] An Optimized Algorithm: Maxchild on Workflow Scheduling
International Journal of Applied Engineering Research [IJAER], 2018
[20] Retrieving Real Time Data Through IOT Devices and Storing Securely on Cloud Using Li-Fi
2018
[21] The Perception of Information Security Threats Surrounding the Cloud Computing Environment
2018
[22] Comprehensive Analysis of Security Mechanisms Within Cloud Computing
International Journal of Computer Science Trends and Technology (IJCST), 2018
[23] Requirement Engineering for Security Issues in Cloud Computing
2018
[24] THE MANAGEMENT OF IT SOLUTIONS SECURITY OFFERED IN PUBLIC CLOUD COMPUTING
2018
[25] Studying the Effect of Using E-Learning Through Secure Cloud Computing Systems
2018
[26] Accepting the Cloud: A Quantitative Predictive Analysis of Cloud Trust and Acceptance Among IT Security Professionals
2018
[27] AN INSIGHT INTO SERVICE MODEL SPECIFIC SECURITY IN CLOUDCOMPUTING
Global Journal of Engineering Science and Research Management, 2018
[28] Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
Security and Communication Networks, 2018
[29] SMART CARD BASED AUTOMATED TOLL PLAZA SYSTEM
International Research Journal of Engineering and Technology, 2018
[30] Certificate Programs in Computer Networks, Security, and Cloud Computing in the USA-A Review
Certificate Programs in Computer Networks, Security, and Cloud Computing in the USA-A Review, 2017
[31] Security and management framework for an organization operating in cloud environment
Annals of Telecommunications, 2017
[32] Role of Scheduling and Load Balancing Algorithms in cloud to improve the Quality of Services
2017
[33] TRUST MODEL FOR EFFECTIVE CLOUD COMPUTING USAGE: A QUANTITATIVE STUDY
2017
[34] An Analytical Account of Cryptography in Cloud Computing and Potential Security Risks
2017
[35] Security and Privacy in Cloud Computing
2017
[36] Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing
International Journal of Science and Research, 2017
[37] Fog computing: Common security issues and proposed countermeasures
2016
[38] Security Issues in Service Models of Cloud Computing
2016
[39] Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role Based Encryption
Procedia Computer Science, 2016
[40] Secure data sharing through additive similarity based ElGamal like encryption
2016
[41] Secured Cloud Computing Using User Classification and Bilinear Diffie-Hellman Schema
2016
[42] Causal Understanding of Limited Adoption of Cloud Computing by Customers
International Journal of Computer Applications, 2015
[43] ANALYSIS OF CLOUD SECURITY ISSUES AND CHALLENGES IN MEDIUM SCALE ENTERPRISES IN PAKISTAN
2015
[44] Security challenges in cloud
2015
[45] A Framework for Homomorphic, Private Information Retrieval Protocols in the Cloud
2015
[46] Does Cloud Storage Lend Itself to Cyberbullying?
Cloud Computing, IEEE, 2015
[47] Research Article DYBACON: An Auditor for Secure Kinetic Cloud Storage
2015
[48] DYBACON: An Auditor for Secure Kinetic Cloud Storage
2015
[49] A Technique to Enhance the Privacy Issues in Cloud Computing
2015
[50] Multi-Level Data Integrity Service
International Journal of Computer Applications, 2014
[51] An Overview of Cloud Computing Delivery Models: Security Issues and Challenges
TS Aluko, AO Ayannusi, OJ Olusanya
[52] Data Breaches in Cloud Computing and its Privacy and Security Aspects
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top