Cloud computing and data security threats taxonomy: A review

被引:0
|
作者
Farsi, Mohammed [1 ]
Ali, Munwar [2 ]
Shah, Reehan Ali [3 ]
Wagan, Asif Ali [4 ]
Kharabsheh, Radwan [5 ]
机构
[1] College of Computer Science Engineering at Yanbu, Taibah University, Yanbu, Saudi Arabia
[2] Department of Information Technology, Shaheed Benazir Bhutto University, Shaheed Benazirabad, Sindh, Pakistan
[3] Department of Computer Systems Engineering, Faculty of Engineering, Islamia University Bahawalpur, Pakistan
[4] Department of Computer Science, SMIU, Karachi, Pakistan
[5] College of Administrative Sciences, Applied Science University, Bahrain
来源
关键词
Cloud security;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:2529 / 2537
相关论文
共 50 条
  • [31] An analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman
    AlZadjali, Amira M.
    Al-Badi, Ali H.
    Ali, Saqib
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 423 - 428
  • [32] Security Threats in Cloud Computing Models: Domains and Proposals
    Revoredo da Silva, Carlo Marcelo
    Costa da Silva, Jose Lutiano
    Rodrigues, Ricardo Batista
    Medeiros Campos, Glaucia Melissa
    do Nascimento, Leandro Marques
    Garcia, Vinicius Cardoso
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 383 - 389
  • [33] Security Issues and Threats According to the Attribute of Cloud Computing
    Lee, Hyangjin
    Kim, Jeeyeon
    Lee, Youngsook
    Won, Dongho
    COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 101 - +
  • [34] Model of hidden IT security threats in the cloud computing environment
    Molyakov A.S.
    Zaborovsky V.S.
    Lukashin A.A.
    Automatic Control and Computer Sciences, 2015, 49 (8) : 741 - 744
  • [35] A survey on cloud computing security: Issues, threats, and solutions
    Singh, Saurabh
    Jeong, Young-Sik
    Park, Jong Hyuk
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 : 200 - 222
  • [36] Cloud Computing Security and Challenges: Issues, Threats, and Solutions
    Alrasheed, Sadeem Hamad
    Alhariri, Majid Aied
    Adubaykhi, Sulaiman Abdulaziz
    El Khediri, Salim
    2022 5TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2022, : 166 - 172
  • [37] Cloud Computing Security Threats and Attacks with their Mitigation Techniques
    Amara, Naseer
    Huang Zhiqui
    Ali, Awais
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 244 - 251
  • [38] Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework
    Khan, Nabeel
    Al-Yasiri, Adil
    11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS, 2016, 94 : 485 - 490
  • [39] Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework
    Khan, Nabeel
    Al-Yasiri, Adil
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2016, 11 (03) : 50 - 64
  • [40] A Security Threats Measurement Model for Reducing Cloud Computing Security Risk
    Lai, Sen-Tarng
    Leu, Fang-Yie
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 414 - 419