Key Topics in Cloud Computing Security: A Systematic Literature Review
Ieee account.
- Change Username/Password
- Update Address
Purchase Details
- Payment Options
- Order History
- View Purchased Documents
Profile Information
- Communications Preferences
- Profession and Education
- Technical Interests
- US & Canada: +1 800 678 4333
- Worldwide: +1 732 981 0060
- Contact & Support
- About IEEE Xplore
- Accessibility
- Terms of Use
- Nondiscrimination Policy
- Privacy & Opting Out of Cookies
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
IMAGES
VIDEO
COMMENTS
In this paper, we review different security challenges in cloud computing like Trust, authenticity, confidentiality, encryption, key management, multitenancy, data splitting, virtual machine ...
We review the research progress on privacy security issues from the perspective of several privacy security protection technologies in cloud computing. First, we introduce some privacy security risks of cloud computing and propose a comprehensive privacy security protection framework.
This systematic literature review (SLR) is aimed to review the existing research studies on cloud computing security, threats, and challenges. This SLR examined the research studies published between 2010 and 2020 within the popular digital libraries.
This systematic literature review (SLR) is aimed to review the existing research studies on cloud computing security, threats, and challenges.
Based on a systematic literature review (hereafter SLR), this paper identifies the key themes and topics in cloud computing security. Findings from an analysis of 275 peer-reviewed publications show that cloud security solutions and cloud security challenges are the two most dominant themes.
The paper provided a brief overview of security concerns across different levels of cloud computing, including infrastructure, data, and the cloud itself. Additionally, the paper discussed the significance of Identity and Access Control in addressing these security challenges.