"Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review"
written by Osama Harfoushi, Bader Alfawwaz, Nazeeh A. Ghatasheh, Ruba Obiedat, Mua’ad M. Abu-Faraj, Hossam Faris,
published by Communications and Network, Vol.6 No.1, 2014
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] A Privacy Preserved Scheme for Data Verification and Integrity Protocol
2019
[2] A brief review: security issues in cloud computing and their solutions.
2019
[3] Analytics on real time security attacks in healthcare, retail and banking applications in the cloud
2019
[4] An Optimized Algorithm: Maxchild on Workflow Scheduling
International Journal of Applied Engineering Research [IJAER], 2018
[5] Retrieving Real Time Data Through IOT Devices and Storing Securely on Cloud Using Li-Fi
2018
[6] The Perception of Information Security Threats Surrounding the Cloud Computing Environment
2018
[7] Comprehensive Analysis of Security Mechanisms Within Cloud Computing
International Journal of Computer Science Trends and Technology (IJCST), 2018
[8] Requirement Engineering for Security Issues in Cloud Computing
2018
[9] THE MANAGEMENT OF IT SOLUTIONS SECURITY OFFERED IN PUBLIC CLOUD COMPUTING
2018
[10] Studying the Effect of Using E-Learning Through Secure Cloud Computing Systems
2018
[11] AN INSIGHT INTO SERVICE MODEL SPECIFIC SECURITY IN CLOUDCOMPUTING
Global Journal of Engineering Science and Research Management, 2018
[12] Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
Security and Communication Networks, 2018
[13] SMART CARD BASED AUTOMATED TOLL PLAZA SYSTEM
International Research Journal of Engineering and Technology, 2018
[14] Certificate Programs in Computer Networks, Security, and Cloud Computing in the USA-A Review
Certificate Programs in Computer Networks, Security, and Cloud Computing in the USA-A Review, 2017
[15] Security and management framework for an organization operating in cloud environment
Annals of Telecommunications, 2017
[16] Role of Scheduling and Load Balancing Algorithms in cloud to improve the Quality of Services
2017
[17] TRUST MODEL FOR EFFECTIVE CLOUD COMPUTING USAGE: A QUANTITATIVE STUDY
2017
[18] Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing
International Journal of Science and Research, 2017
[19] Security and Privacy in Cloud Computing
2017
[20] Fog computing: Common security issues and proposed countermeasures
2016
[21] Security Issues in Service Models of Cloud Computing
2016
[22] Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role Based Encryption
Procedia Computer Science, 2016
[23] Secure data sharing through additive similarity based ElGamal like encryption
2016
[24] Secured Cloud Computing Using User Classification and Bilinear Diffie-Hellman Schema
2016
[25] Causal Understanding of Limited Adoption of Cloud Computing by Customers
International Journal of Computer Applications, 2015
[26] ANALYSIS OF CLOUD SECURITY ISSUES AND CHALLENGES IN MEDIUM SCALE ENTERPRISES IN PAKISTAN
2015
[27] Security challenges in cloud
2015
[28] A Framework for Homomorphic, Private Information Retrieval Protocols in the Cloud
2015
[29] Does Cloud Storage Lend Itself to Cyberbullying?
Cloud Computing, IEEE, 2015
[30] Research Article DYBACON: An Auditor for Secure Kinetic Cloud Storage
2015
[31] A Technique to Enhance the Privacy Issues in Cloud Computing
2015
[32] Multi-Level Data Integrity Service
International Journal of Computer Applications, 2014