References
- Leila, B., Abdelhafid, Z., & Mahieddine, D. (2017, April). New framework model to secure Cloud data storage. In Computer Science On-line Conference (pp. 44-52). Springer, Cham.
- Jin, C., Gohil, V., Karri, R., & Rajendran, J. (2020). Security of Cloud FPGAs: A Survey. arXiv preprint arXiv:2005.04867.
- Rao, R. V., & Selvamani, K. (2015). Data security challenges and its solutions in cloud computing. Procedia Computer Science, 48, 204-209. https://doi.org/10.1016/j.procs.2015.04.171
- Kacha, L., & Zitouni, A. (2017, September). An overview on data security in cloud computing. In Proceedings of the Computational Methods in Systems and Software (pp. 250-261). Springer, Cham.
- Benabied, S., Zitouni, A., & Djoudi, M. (2015, June). A cloud security framework based on trust model and mobile agent. In 2015 International Conference on Cloud Technologies and Applications (CloudTech) (pp. 1-8). IEEE.
- Mathariya, S. Implementation of security architecture in Cloud computing using ECC and BLOWFISH algorithm.
- Dheyab, O. A., Turki, A. I., & Rahmatullah, B. (2018). Threats and Vulnerabilities Affecting the Adoption of Cloud Computing in Iraq. The Journal of Social Sciences Research, 599-606. https://doi.org/10.32861/jssr.spi6.599.606
- Jamil, D., & Zaki, H. (2011). Security issues in cloud computing and countermeasures. International Journal of Engineering Science and Technology (IJEST), 3(4), 2672-2676.
- Abdul-Jabbar, S. S., Aldujaili, A., Mohammed, S. G., & Saeed, H. S. (2020). Integrity and Security in Cloud Computing Environment: A Review. Journal of Southwest Jiaotong University, 55(1)
- De Donno, M., Giaretta, A., Dragoni, N., Bucchiarone, A., & Mazzara, M. (2019). Cyber-storms come from clouds: Security of cloud computing in the IoT era. Future Internet, 11(6), 127. https://doi.org/10.3390/fi11060127
- Qi, Q., & Tao, F. (2019). A smart manufacturing service system based on edge computing, fog computing, and cloud computing. IEEE Access, 7, 86769-86777. https://doi.org/10.1109/ACCESS.2019.2923610
- Kaur, R., & Kinger, S. (2014). Analysis of security algorithms in cloud computing. International Journal of Application or Innovation in Engineering & Management (IJAIEM), 3(3), 171-176.
- Singh, J. (2014). Cyber-attacks in cloud computing: A case study. International Journal of Electronics and Information Engineering, 1(2), 78-87.
- Vaquero, L. M., Rodero-Merino, L., & Moran, D. (2011). Locking the sky: a survey on IaaS cloud security. Computing, 91(1), 93-118. https://doi.org/10.1007/s00607-010-0140-x
- Venkatraman, K., & Geetha, K. (2019). Dynamic virtual cluster cloud security using hybrid steganographic image authentication algorithm. Automatika, 60(3), 314-321. https://doi.org/10.1080/00051144.2019.1624409
- Arora, A., Khanna, A., Rastogi, A., & Agarwal, A. (2017, January). Cloud security ecosystem for data security and privacy. In 2017 7th International Conference on Cloud Computing, Data Science & Engineering-Confluence (pp. 288-292). IEEE.
- Arora, A., Khanna, A., Rastogi, A., & Agarwal, A. (2017, January). Cloud security ecosystem for data security and privacy. In 2017 7th International Conference on Cloud Computing, Data Science & Engineering-Confluence (pp. 288-292). IEEE.
- Alam, T. (2020). Internet of Things: A Secure Cloud-based MANET Mobility Model. IJ Network Security, 22(3), 514-520.
- Cloud security and compliance - A semantic approach in end to end securityArticle in International Journal on Smart Sensing and Intelligent Systems.September 2017 DOI: 10.21307/ijssis-2017-265.
- Mesbahi, M. R., Rahmani, A. M., & Hosseinzadeh, M. (2018). Reliability and high availability in cloud computing environments: a reference roadmap. Human-centric Computing and Information Sciences, 8(1), 20. https://doi.org/10.1186/s13673-018-0143-8
- Yang, H., & Kim, Y. (2019). Design and Implementation of High-Availability Architecture for IoT-Cloud Services. Sensors, 19(15), 3276. https://doi.org/10.3390/s19153276
- Rayan, A., Alhazemi, F., Alshammari, H., & Nah, Y. (2020). Developing Cloud Computing Time Slot-availability Predictions Using an Artificial Neural Network. IEIE Transactions on Smart Processing & Computing, 9(1), 49-57. https://doi.org/10.5573/ieiespc.2020.9.1.049
- Mishra, P., Pilli, E. S., Varadharajan, V., & Tupakula, U. (2017). Intrusion detection techniques in cloud environment: A survey. Journal of Network and Computer Applications, 77, 18-47. https://doi.org/10.1016/j.jnca.2016.10.015
- Zekri, M., El Kafhali, S., Aboutabit, N., & Saadi, Y. (2017, October). DDoS attack detection using machine learning techniques in cloud computing environments. In 2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech) (pp. 1-7). IEEE.
- Alhenaki, L., Alwatban, A., Alamri, B., & Alarifi, N. (2019, May). A survey on the security of cloud computing. In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS) (pp. 1-7). IEEE.
- Chand, K. S., & Rani, B. K. (2018). Biometric Authentication using SaaS in Cloud Computing. International Research Journal of Engineering and Technology (IRJET), 5(2).
- Shunmugapriya, B., & Paramasivan, B. Protection Against SQL Injection Attack in Cloud Computing.
- Patel, R. V., Bhoi, D., & Pawar, C. S. (2020). Security Hazards, Attacks and Its Prevention Techniques in Cloud Computing: A Detail Review.
- Abusaimeh, H. (2020). Security Attacks in Cloud Computing and Corresponding Defending Mechanisims. International Journal of Advanced Trends in Computer Science and Engineering, 9(3).
- Desarkar, A., & Das, A. (2019). Encryption Algorithm for Data Security in Cloud Computing. Security Designs for the Cloud, Iot, and Social Networking, 1-18.
- Alhenaki, L., Alwatban, A., Alahmri, B., & Alarifi, N. (2019). Security in cloud computing: a survey. International Journal of Computer Science and Information Security (IJCSIS), 17(4).