On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

[HTML][HTML] Cloud computing and trust evaluation: A systematic literature review of the state-of-the-art mechanisms

M Chiregi, NJ Navimipour - Journal of Electrical Systems and Information …, 2018 - Elsevier
Cloud computing is a model to enable the convenient access to the network request for
sharing the groups of configurable calculating resources. In this environment, confidences …

Establishing a zero trust strategy in cloud computing environment

S Mehraj, MT Banday - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
The increased use of cloud services and its various security and privacy challenges such as
identity theft, data breach, data integrity and data confidentiality has made trust …

[HTML][HTML] Trust mechanisms for cloud computing

J Huang, DM Nicol - Journal of Cloud Computing: Advances, Systems and …, 2013 - Springer
Trust is a critical factor in cloud computing; in present practice it depends largely on
perception of reputation, and self assessment by providers of cloud services. We begin this …

Cloud learning management system in higher education

CK Chen, MN Almunawar - … Up Education for Inclusivity Across Digital …, 2019 - igi-global.com
The main objective of this chapter is to discuss the growth of cloud-based learning
management system (LMS) in higher education. This will look at the benefits of LMS …

Compliance-based multi-dimensional trust evaluation system for determining trustworthiness of cloud service providers

S Singh, J Sidhu - Future Generation Computer Systems, 2017 - Elsevier
This paper addresses the problem of determining trustworthiness of Cloud Service Providers
(CSPs) in a cloud environment. For the current work, trustworthiness is defined as the …

Cloud-dew architecture

Y Wang - International Journal of Cloud Computing, 2015 - inderscienceonline.com
Users derive many benefits by storing personal data in cloud computing services; however
the drawback of storing data in these services is that the user cannot access his/her own …

A survey of security and privacy challenges in cloud computing: solutions and future directions

Y Liu, YL Sun, J Ryoo, AV Vasilakos - 2015 - scholarcommons.scu.edu
While cloud computing is gaining popularity, diverse security and privacy issues are
emerging that hinder the rapid adoption of this new computing paradigm. And the …

Cloud computing security challenges, threats and vulnerabilities

MK Sasubilli, R Venkateswarlu - 2021 6th international …, 2021 - ieeexplore.ieee.org
Cloud computing has grown to become an integral part of present as well as future
information technologies. This technology has been designed to be used with internet by …

Privacy in cloud computing environments: a survey and research challenges

A Ghorbel, M Ghorbel, M Jmaiel - The Journal of Supercomputing, 2017 - Springer
Definitely, cloud computing represents a real evolution in the IT world that provides many
advantages for both providers and users. This new paradigm includes several services that …