0% found this document useful (0 votes)
43 views

Paper 21-Application of Intelligent Data Mining Approach in Securing 9

This document contains a literature review of 56 sources related to security challenges and solutions in cloud computing. The sources discuss topics such as secure and scalable data access control in cloud environments, security issues and challenges including data security, emerging threats and responses, and approaches to addressing security challenges through things like enhanced data security models and engineering processes.

Uploaded by

Shiva prasad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

Paper 21-Application of Intelligent Data Mining Approach in Securing 9

This document contains a literature review of 56 sources related to security challenges and solutions in cloud computing. The sources discuss topics such as secure and scalable data access control in cloud environments, security issues and challenges including data security, emerging threats and responses, and approaches to addressing security challenges through things like enhanced data security models and engineering processes.

Uploaded by

Shiva prasad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

(IJACSA) International Journal of Advanced Computer Science and Applications,

Vol. 7, No. 9, 2016

[44] M.B. Mollah, K.R. Islam, and S.S. Islam. Next generation of computing [51] Eystein Mathisen. Security Challenges and Solutions in Cloud
through cloud computing technology, in: 2012 25th IEEE Canadian Computing, in: International Conference on Digital Ecosystems and
Conference on Electrical Computer Engineering (CCECE), May Technologies (IEEE DEST 2011), 2011.p.208-212.
2012.p.1-6. [52] R. Velumadhava Raoa, K. Selvamanib , Data Security Challenges and Its
[45] Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou. Achieving Solutions in Cloud Computing , 2015 The Authors. Published by Elsevier
secure, scalable and fine-grained data access control in cloud computing, B.V. This is an open access article under the CC BY-NC-ND license
in: IN-FOCOM, 2010 Proceedings IEEE, 2010.p.1-9. (http://creativecommons.org/licenses/by-nc-nd/4.0/). Conference
[46] Kresimir Popovic and Zeljko Hocenski. Cloud computing security issues Organized by Interscience Institute of Management and Technology,
and challenges, in: MIPRO, 2010 Proceedings of the 33rd International Bhubaneswar, Odisha, India ,Peer-review under responsibility of
Convention, 2010.p.344-349. scientific committee of International Conference on Computer,
Communication and Convergence (ICCC 2015)
[47] Akhil Bhel, Emerging Security Challenges in Cloud Computing.
Information and Communication Technologies, in: 2011 World Congress [53] J. Staten, “Is Cloud Computing Ready For The Enterprise,” Forrester ...
on, Mumbai, 2011.p.217-222. 17th International workshop on Quality of Service, pp.1–9, July 13–15,
2009.
[48] Farzad Sabahi. Cloud Computing Security Threats and Responses, in:
IEEE 3rd International Conference on Communication software and [54] Jay Heiser and Mark Nicolett, " An Engineering Process to Address
Networks(ICCSN), May 2011.p.245-249. Security Challenges in Cloud Computing" ASE
BIGDATA/SOCIALCOM/CYBERSECURITY Conference, Stanford
[49] Eman M.Mohamed, Hatem S Abdelkader, Sherif EI Etriby. Enhanced University, May 27-31, 2014
Data Security Model for Cloud Computing, in:8th International
Conference on Informatics and Systems(INFOS), Cairo, May 2012.p.12- [55] Seccombe A, et al. Security guidance for critical areas of focus in cloud
17. computing. Cloud Security Alliance, 2009.
[50] Wentao Liu. Research on Cloud Computing Security Problem and [56] Paula Kotzé , et al. Secure cloud computing: Benefits, risks and controls,
Strategy, in: 2nd International Conference on Consumer Electronics. ieeexplore.ieee.org/iel5/6017604/.../06027519.pdf
Communications and Networks (CECNet), April 2012.p.1216-1219.

159 | P a g e
www.ijacsa.thesai.org

You might also like