Communications and Network

Communications and Network

ISSN Print: 1949-2421
ISSN Online: 1947-3826
www.scirp.org/journal/cn
E-mail: cn@scirp.org
"Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review"
written by Osama Harfoushi, Bader Alfawwaz, Nazeeh A. Ghatasheh, Ruba Obiedat, Mua’ad M. Abu-Faraj, Hossam Faris,
published by Communications and Network, Vol.6 No.1, 2014
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Cloud Computing: Security Issues and Challenges
2021
[2] Skills and Competences for Utilization of Web Storage Technology (WST) Platform for Academic Activities by Faculty Members in Faculty of Education, Ahmadu Bello …
2020
[3] A Prototype for Data Integrity in Cloud Environment
2020
[4] SECURITY FLAWS AND RISKS IN CLOUD COMPUTING SERVICE: A QUALITATIVE CASE STUDY
2019
[5] Analytics on real time security attacks in healthcare, retail and banking applications in the cloud
2019
[6] A brief review: security issues in cloud computing and their solutions
2019
[7] A Privacy Preserved Scheme for Data Verification and Integrity Protocol
2019
[8] A brief review: security issues in cloud computing and their solutions.
2019
[9] Data Access and security in Cloud integrated IoT
2019
[10] SIGURIA DHE PRIVATËSIA NË SEKTORIN BANKAR QË PËRDORIN SHËRBIME TË BAZUARA NË CLOUD: SFIDAT DHE KONTROLLET
2019
[11] An Optimized Algorithm: Maxchild on Workflow Scheduling
International Journal of Applied Engineering Research [IJAER], 2018
[12] Retrieving Real Time Data Through IOT Devices and Storing Securely on Cloud Using Li-Fi
2018
[13] The Perception of Information Security Threats Surrounding the Cloud Computing Environment
2018
[14] Comprehensive Analysis of Security Mechanisms Within Cloud Computing
International Journal of Computer Science Trends and Technology (IJCST), 2018
[15] Requirement Engineering for Security Issues in Cloud Computing
2018
[16] THE MANAGEMENT OF IT SOLUTIONS SECURITY OFFERED IN PUBLIC CLOUD COMPUTING
2018
[17] Studying the Effect of Using E-Learning Through Secure Cloud Computing Systems
2018
[18] Accepting the Cloud: A Quantitative Predictive Analysis of Cloud Trust and Acceptance Among IT Security Professionals
2018
[19] AN INSIGHT INTO SERVICE MODEL SPECIFIC SECURITY IN CLOUDCOMPUTING
Global Journal of Engineering Science and Research Management, 2018
[20] Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
Security and Communication Networks, 2018
[21] SMART CARD BASED AUTOMATED TOLL PLAZA SYSTEM
International Research Journal of Engineering and Technology, 2018
[22] Certificate Programs in Computer Networks, Security, and Cloud Computing in the USA-A Review
Certificate Programs in Computer Networks, Security, and Cloud Computing in the USA-A Review, 2017
[23] Security and management framework for an organization operating in cloud environment
Annals of Telecommunications, 2017
[24] Role of Scheduling and Load Balancing Algorithms in cloud to improve the Quality of Services
2017
[25] TRUST MODEL FOR EFFECTIVE CLOUD COMPUTING USAGE: A QUANTITATIVE STUDY
2017
[26] An Analytical Account of Cryptography in Cloud Computing and Potential Security Risks
2017
[27] Security and Privacy in Cloud Computing
2017
[28] Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing
International Journal of Science and Research, 2017
[29] Fog computing: Common security issues and proposed countermeasures
2016
[30] Security Issues in Service Models of Cloud Computing
2016
[31] Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role Based Encryption
Procedia Computer Science, 2016
[32] Secure data sharing through additive similarity based ElGamal like encryption
2016
[33] Secured Cloud Computing Using User Classification and Bilinear Diffie-Hellman Schema
2016
[34] Causal Understanding of Limited Adoption of Cloud Computing by Customers
International Journal of Computer Applications, 2015
[35] ANALYSIS OF CLOUD SECURITY ISSUES AND CHALLENGES IN MEDIUM SCALE ENTERPRISES IN PAKISTAN
2015
[36] Security challenges in cloud
2015
[37] A Framework for Homomorphic, Private Information Retrieval Protocols in the Cloud
2015
[38] Does Cloud Storage Lend Itself to Cyberbullying?
Cloud Computing, IEEE, 2015
[39] Research Article DYBACON: An Auditor for Secure Kinetic Cloud Storage
2015
[40] DYBACON: An Auditor for Secure Kinetic Cloud Storage
2015
[41] A Technique to Enhance the Privacy Issues in Cloud Computing
2015
[42] Multi-Level Data Integrity Service
International Journal of Computer Applications, 2014
[43] Analysis of Several Data Security Issues in Cloud Computing with Cryptographic Algorithms
Free SCIRP Newsletters
Copyright © 2006-2022 Scientific Research Publishing Inc. All Rights Reserved.
Top