Cloud computing security taxonomy: From an atomistic to a holistic view

SN Mthunzi, E Benkhelifa, T Bosakowski… - Future Generation …, 2020 - Elsevier
Countless discussions around security challenges affecting cloud computing are often large
textual accounts, which can be cumbersome to read and prone to misinterpretation. The …

[PDF][PDF] Risk management frameworks for cloud computing: a critical review

R Alosaimi, M Alnuem - International Journal of Computer Science & …, 2016 - academia.edu
Cloud computing technology has experienced exponential growth over the past few years. It
provides many advantages for both individuals and organizations. However, at the same …

Surveying and analyzing security problems in cloud computing environments

M Jouini, LBA Rabai - 2014 Tenth International Conference on …, 2014 - ieeexplore.ieee.org
Cloud computing technology is a relatively new concept of providing dramatically scalable
and virtualized resources, software and hardware on demand to consumers. Cloud …

Symmetric fully homomorphic encryption using decidable matrix equations

P Burtyka, O Makarevich - … of the 7th International Conference on …, 2014 - dl.acm.org
We propose a new fully homomorphic encryption (FHE) scheme. Unlike previous ones, our
FHE scheme is effective and simple enough for practical applications. Our FHE essentially …

CORE framework for evaluating the reliability of SaaS products

R Vidhyalakshmi, V Kumar - Future Generation Computer Systems, 2017 - Elsevier
SaaS is revolutionizing the way of software delivery. Numerous tangible and intangible
benefits of SaaS adoption enable organizations to reduce costs, increase efficiency …

Analysis of VM communication for VM-based cloud security systems

SN Mthunzi, E Benkhelifa, MA Alsmirat… - … on Software Defined …, 2018 - ieeexplore.ieee.org
Cloud computing's seemingly limitless scalability lies in part, in the ability for cloud
consumers to instantiate virtual resources when demand scales up, and terminate them …

[PDF][PDF] The Perception of Information Security Threats Surrounding the Cloud Computing Environment

HM Fadhil - International Journal of Computing and Digital …, 2018 - pdfs.semanticscholar.org
a form for permitting services to user's everywhere is Cloud Computing; a suitable departure
to the network is available upon request for a common set of constructive computing …

[PDF][PDF] Factors influencing fog computing adoption based on quality of results (QoR) for heterogeneous data analysis: a proposed framework

NHA Malic, TAT Izhar, MRA Kadir - International Journal of Recent …, 2019 - academia.edu
The rapid increase of data generated has brought challenges on data quality level. Fog
computing in general has been supporting the requirements of end user devices that could …

[PDF][PDF] Potential Security Issues in Implementing IaaS and PaaS Cloud Service Models

WKA Erlangga, MR Ramadhan - International Journal of …, 2022 - ojs.unikom.ac.id
1. BACKGROUND Despite the recent explosion in popularity of cloud computing, the cloud
models provided by different public cloud providers continue to be focused on three service …

The Influence of the Use of Mobile Devices and the Cloud Computing in Organizations

F Moreira, MP Cota, R Gonçalves - New Contributions in Information …, 2015 - Springer
In the last decade, companies tend to become virtualized. This virtualization is due in large
part to developments in the use of mobile platforms and the impact on their infrastructure …