Cloud Computing Issues, Challenges, and Needs: A Survey
DOI: http://dx.doi.org/10.30630/joiv.5.3.671
Abstract
Keywords
Full Text:
PDFReferences
C. Sumner, A. Byers, and M. Shearing, Determining personality traits & privacy concerns from facebook activity, Black Hat Briefings, vol. 11, pp. 197-221, 2011.
T. Alakurt, Adaptation of online privacy concern scale into turkish culture, 2017.
R. Arora, A. Parashar, and C. C. I. Transforming, Secure user data in cloud computing using encryption algorithms, International journal of engineering research and applications, vol. 3, no. 4, pp. 1922-1926, 2013.
O. Kocabas and T. Soyata, Towards privacy-preserving medical cloud computing using homomorphic encryption, in Virtual and Mobile Healthcare: Breakthroughs in Research and Practice: IGI Global, 2020, pp. 93-125.
S. Subashini and V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of network and computer applications, vol. 34, no. 1, pp. 1-11, 2011.
S. N. Kumar and A. Vajpayee, A survey on secure cloud: security and privacy in cloud computing, American Journal of Systems and Software, vol. 4, no. 1, pp. 14-26, 2016.
Z. Shen and Q. Tong, The security of cloud computing system enabled by trusted computing technology, in Signal Processing Systems (ICSPS), 2010 2nd International Conference on, 2010, vol. 2, pp. V2-11-V2-15: IEEE.
S. Xie, Z. Zheng, W. Chen, J. Wu, H.-N. Dai, and M. Imran, Blockchain for cloud exchange: A survey, Computers & Electrical Engineering, vol. 81, p. 106526, 2020.
T. Wang, Y. Mei, W. Jia, X. Zheng, G. Wang, and M. Xie, Edge-based differential privacy computing for sensor–cloud systems, Journal of Parallel and Distributed Computing, vol. 136, pp. 75-85, 2020.
S. A. Osia et al., A hybrid deep learning architecture for privacy-preserving mobile analytics, IEEE Internet of Things Journal, 2020.
J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos, Security and privacy for cloud-based IoT: Challenges, IEEE Communications Magazine, vol. 55, no. 1, pp. 26-33, 2017.
P. Li et al., Multi-key privacy-preserving deep learning in cloud computing, Future Generation Computer Systems, vol. 74, pp. 76-85, 2017.
M. B. Mollah, M. A. K. Azad, and A. Vasilakos, Security and privacy challenges in mobile cloud computing: Survey and way ahead, Journal of Network and Computer Applications, vol. 84, pp. 38-54, 2017.
S. Sharma, K. Chen, and A. Sheth, Toward practical privacy-preserving analytics for IoT and cloud-based healthcare systems, IEEE Internet Computing, vol. 22, no. 2, pp. 42-51, 2018.
M. Alsajri, M. A. Ismail, and S. Abdul-Baqi, A review on the recent application of Jaya optimization algorithm, in 2018 1st Annual International Conference on Information and Sciences (AiCIS), 2018, pp. 129-132: IEEE.
S. A.-b. Salman, A.-H. A. Salih, A. H. Ali, M. K. Khaleel, and M. A. Mohammed, A New Model for Iris Classification Based on Naïve Bayes Grid Parameters Optimization. International Journal of Sciences: Basic and Applied Research (IJSBAR) (2018) Volume 40, No 2, pp 150-155.
M. K. Khaleel, M. A. Ismail, U. Yunan, and S. Kasim, Review on Intrusion Detection System Based on The Goal of The Detection System, International Journal of Integrated Engineering, vol. 10, no. 6, 2018.
Z. F. Hussain et al., A new model for iris data set classification based on linear support vector machine parameter's optimization, International Journal of Electrical & Computer Engineering (2088-8708), vol. 10, 2020.
B. Q. Elias, M. Alsajri, P. J. Soh, and A. A. Al-hadi, Design of Flexible Planar Antennas Using Substrate Gap Structure for Surface Wave Reduction, in 2019 22nd International Conference on Control Systems and Computer Science (CSCS), 2019, pp. 453-458: IEEE.
M. A. Mohammed et al., A Focal load balancer based algorithm for task assignment in cloud environment, in 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2018, pp. 1-4: IEEE.
D. Chen and H. Zhao, Data security and privacy protection issues in cloud computing, in 2012 International Conference on Computer Science and Electronics Engineering, 2012, vol. 1, pp. 647-651: IEEE.
P. Mell and T. Grance, The NIST definition of cloud computing, 2011.
E. Knorr and G. Gruman, What cloud computing really means, InfoWorld, vol. 7, pp. 20-20, 2008.
J. Brodkin, Gartner: Seven cloud-computing security risks, Infoworld, vol. 2008, pp. 1-3, 2008.
R. Chow et al., Controlling data in the cloud: outsourcing computation without outsourcing control, in Proceedings of the 2009 ACM workshop on Cloud computing security, 2009, pp. 85-90: ACM.
F. Zafar et al., A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends, Computers & Security, vol. 65, pp. 29-49, 2017.
M. Ahmadian, F. Plochan, Z. Roessler, and D. C. Marinescu, SecureNoSQL: An approach for secure search of encrypted NoSQL databases in the public cloud, International Journal of Information Management, vol. 37, no. 2, pp. 63-74, 2017.
D. Zissis and D. Lekkas, Addressing cloud computing security issues, Future Generation computer systems, vol. 28, no. 3, pp. 583-592, 2012.
T. Wang et al., Fog-based storage technology to fight with cyber threat, Future Generation Computer Systems, vol. 83, pp. 208-218, 2018.
O. Razi, S. Sanyal, M. Raza, S. Sourav, and R. Somkunwar, A survey paper on improving performance and enhancing security by using division and replication of data in cloud, International Journal of Advanced Research in Computer Science, vol. 9, no. 2, 2018.
K. Patel and A. Alabisi, Cloud Computing Security Risks: Identification and Assessment, The Journal of New Business Ideas & Trends, vol. 17, no. 2, pp. 11-19, 2019.
W. I. Yudhistyra, E. M. Risal, I.-s. Raungratanaamporn, and V. Ratanavaraha, Using Big Data Analytics for Decision Making: Analyzing Customer Behavior using Association Rule Mining in a Gold, Silver, and Precious Metal Trading Company in Indonesia, International Journal of Data Science, vol. 1, no. 2, pp. 57-71, 2020.
A. H. Ali, Fuzzy generalized Hebbian algorithm for large-scale intrusion detection system, International Journal of Integrated Engineering, vol. 12, no. 1, pp. 81-90, 2020.
M. Ahmad Dar, Security Architecture for Low Resource Devices in Smart City using Cloud, 2020, smartphone; elliptic curve; smart city; cloud vol. 4, no. 3, p. 4, 2020-09-30 2020.
N. R. Zaynalov, U. K. Narzullaev, A. N. Muhamadiev, I. R. Rahmatullaev, and R. K. Buranov, Combining Invisible Unicode Characters To Hide Information In A Text Document, 2020, vol. 4, no. 3, p. 6, 2020-09-30 2020.
P. Khandare, S. Deokar, and A. Dixit, Improvement of Traditional Protection System in the Existing Hybrid Microgrid with Advanced Intelligent Method, International Journal on Data Science, vol. 1, no. 2, pp. 72-81, 2020.
I. M. Al-Joboury and E. H. Al-Hemiary, “Virtualized Fog Network with Load Balancing for IoT based Fog-to-Cloud,†JOIV : International Journal on Informatics Visualization, vol. 4, no. 3, Jul. 2020.