On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Cloud security issues and challenges: A survey

A Singh, K Chatterjee - Journal of Network and Computer Applications, 2017 - Elsevier
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …

Security in cloud computing: Opportunities and challenges

M Ali, SU Khan, AV Vasilakos - Information sciences, 2015 - Elsevier
The cloud computing exhibits, remarkable potential to provide cost effective, easy to
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …

Security issues with virtualization in cloud computing

V Kumar, RS Rathore - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
Cloud Computing is a scalable system of shared resource pooling with the help of
virtualization. For secure resource pooling, we need a secure way to isolate every virtual …

An exhaustive survey on security concerns and solutions at different components of virtualization

R Patil, C Modi - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Virtualization is a key enabler of various modern computing technologies. However, it brings
additional vulnerabilities that can be exploited to affect the availability, integrity, and …

A parallel algorithm for constructing binary decision diagrams

S Kimura, EM Clarke - Proceedings., 1990 IEEE International …, 1990 - ieeexplore.ieee.org
A parallel algorithm for constructing binary decision diagrams is described. The algorithms
treats binary decision graphs as minimal finite automata. The automation for a Boolean …

[PDF][PDF] Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.

SS Pericherla - ISC Int. J. Inf. Secur., 2023 - researchgate.net
Cloud computing created a revolution in the way IT organizations and IT teams manage their
internal digital resources and workloads. One major drawback or limitation of cloud …

Secure virtual machine image storage process into a trusted zone-based cloud storage

C El Balmany, Z Tbatou, A Asimi, M Bamarouf - Computers & Security, 2022 - Elsevier
The emerging trend of Cloud Computing inducts virtualization as the quintessence concept
to offer to end users a large scale Infrastructure-as-a-Service (IaaS) paradigm. Virtualization …

Btdetect: An insider threats detection approach based on behavior traceability for iaas environments

L Lin, S Li, X Lv, B Li - 2021 IEEE Intl Conf on Parallel & …, 2021 - ieeexplore.ieee.org
How to detect malicious insiders' improper access to tenant data has become more crucial in
IaaS cloud environment, especially with the cloud administrators gaining more control on …

Toward confirming a framework for securing the virtual machine image in cloud computing

RK Hussein, A Alenezi, HF Atlam… - Advances in Science …, 2017 - eprints.soton.ac.uk
The concept of cloud computing has arisen thanks to academic work in the fields of utility
computing, distributed computing, virtualisation, and web services. By using cloud …