Cited 398 time in
A survey on cloud computing security: Issues, threats, and solutions
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Singh, Saurabh | - |
| dc.contributor.author | Jeong, Young-Sik | - |
| dc.contributor.author | Park, Jong Hyuk | - |
| dc.date.accessioned | 2024-08-08T04:31:41Z | - |
| dc.date.available | 2024-08-08T04:31:41Z | - |
| dc.date.issued | 2016-11 | - |
| dc.identifier.issn | 1084-8045 | - |
| dc.identifier.issn | 1095-8592 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/18074 | - |
| dc.description.abstract | Over the internet, the cloud computing reveals a remarkable potential to provide on-demand services to consumers with greater flexibility in a cost effective manner. While moving towards the concept of on demand service, resource pooling, shifting everything on the distributive environment, security is the major obstacle for this new dreamed vision of computing capability. This survey present a comprehensive overview of the security issues for different factors affecting cloud computing. Furthermore, a detailed discussion on several key topics regarding embedded system, application, storage system, clustering related issues and many more. This paper works on some public cloud and private cloud authorities as well as related security concerns. Additionally, it encompasses the requirements for better security management and suggests 3-tier security architecture. Open issues with discussion in which some new security concepts and recommendations are also provided. (C) 2016 Elsevier Ltd. All rights reserved. | - |
| dc.format.extent | 23 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD | - |
| dc.title | A survey on cloud computing security: Issues, threats, and solutions | - |
| dc.type | Article | - |
| dc.publisher.location | 영국 | - |
| dc.identifier.doi | 10.1016/j.jnca.2016.09.002 | - |
| dc.identifier.scopusid | 2-s2.0-84987852363 | - |
| dc.identifier.wosid | 000386406300015 | - |
| dc.identifier.bibliographicCitation | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v.75, pp 200 - 222 | - |
| dc.citation.title | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS | - |
| dc.citation.volume | 75 | - |
| dc.citation.startPage | 200 | - |
| dc.citation.endPage | 222 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Interdisciplinary Applications | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
| dc.subject.keywordPlus | PRIVACY | - |
| dc.subject.keywordPlus | CHALLENGES | - |
| dc.subject.keywordPlus | VIRTUALIZATION | - |
| dc.subject.keywordPlus | ARCHITECTURE | - |
| dc.subject.keywordPlus | PROTECTION | - |
| dc.subject.keywordPlus | TRUST | - |
| dc.subject.keywordPlus | ERA | - |
| dc.subject.keywordAuthor | Cloud computing | - |
| dc.subject.keywordAuthor | Security | - |
| dc.subject.keywordAuthor | Embedded system | - |
| dc.subject.keywordAuthor | Resource pooling | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
