Open Access
Issue
MATEC Web Conf.
Volume 200, 2018
International Workshop on Transportation and Supply Chain Engineering (IWTSCE’18)
Article Number 00007
Number of page(s) 9
DOI https://doi.org/10.1051/matecconf/201820000007
Published online 14 September 2018
  1. R. Buyya, J. Broberg, A.M. Goscinski, “Cloud Computing: Principles and Paradigms”. ISBN: 9781-119-14340-6. 664 pages, June (2015). [Google Scholar]
  2. N. Grozev, R. Buyya, “Inter-Cloud architectures and application brokering: taxonomy and survey. Software – practice and experience. Published online 12 December (2012) in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/spe.2168. [Google Scholar]
  3. P. Mell, T. Grance, “The NIST Definition of Cloud Computing, National Institute of Standards and Technology”, Information Technology Laboratory, Technical Report Version 15, (2009). [Google Scholar]
  4. Subashini S., Kavitha V. “A survey on security issues in service delivery models of cloud computing”. In: Journal of Network and Computer Applications 34, pp.1–11, (2011). [CrossRef] [Google Scholar]
  5. R. Buyya, CS. Yeo, S. Venugopal, J. Broberg, I. Brandic, “Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility”. Future Generation Computer Systems, 25(6), pp. 599–616, (2009). [CrossRef] [Google Scholar]
  6. G. Lewis, “Basics about cloud computing”. Technical Report September, Software Engineering Institute – Carnegie Mellon, (2010). [Google Scholar]
  7. R. Buyya, S. Pandey, C. Vecchiola, “Cloudbus toolkit for market-oriented cloud computing”. In Cloud Computing, Jaatun M, Zhao G, Rong C (eds) ed:, 5931. Springer: Berlin / Heidelberg, pp.24–44, (2009). [Google Scholar]
  8. Y. Hu and G. Bai, “A systematic literature review of Cloud Computing in ehealth”. In: Health Informatics-An International Journal (HIIJ) 3(4), November (2014). [Google Scholar]
  9. C. Modi et al., “A survey on security issues and solutions at different layers of cloud computing”. The Journal of Supercomputing, 63(2): 561–592, (2013) [CrossRef] [Google Scholar]
  10. S. Hamouda, “Security and privacy in cloud computing”. In Cloud Computing Technologies, Applications and Management (ICCCTAM), IEEE 2012 International Conference on, (2012) [Google Scholar]
  11. N. Fernando, SW. Loke, W. Rahayu, “Mobile cloud computing: a survey”. Future Generation Computer Systems (2013), 29(1), pp. 84–106. [CrossRef] [Google Scholar]
  12. S. Iqbal, M.L.M. Kiah, NB. Anuar, B. Daghighi, Wahab AWA., S. Khan, “Service delivery models of cloud computing: security issues and open challenges”. Published online 30 August 2016 in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.1585. [Google Scholar]
  13. H. Qi et al. Sierpinski triangle based data center architecture in cloud computing. The Journal of Supercomputing (2014); 69(2), pp.887–907. [CrossRef] [Google Scholar]
  14. A.S. Ibrahim et al. Cloudsec: a security monitoring appliance for virtual machines in the iaas cloud model. in Network and System Security (NSS), IEEE 2011 5th International Conference on, (2011) [Google Scholar]
  15. M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, “Above the clouds: A Berkeley view of cloud computing,” EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009–28, 2009. [Google Scholar]
  16. Y. Ghanam, J. Ferreira, F. Maurer. Emerging Issues & Challenges in Cloud Computing— A Hybrid Approach. Journal of Software Engineering and Applications, 5, pp. 923–937, (2012). [CrossRef] [Google Scholar]
  17. D. Petcu, G. Macariu, S. Panica, and C. Crăciun, “Portable cloud applications—from theory to practice”. In: Future Generation Computer Systems, 29, pp. 1417–1430, (2013). [CrossRef] [Google Scholar]
  18. B. Kitchenham, O.P. Brereton, D. Budgen, M. Turner, J. Bailey, S. Linkman, “Systematic literature reviews in software engineering—a systematic literature review”. Inform.Softw.Technol. 51(1), pp. 7–15, (2009). [CrossRef] [Google Scholar]
  19. C.L. Liu, W.H. Chen and D.K. Tung, “Identification of Critical Security Issues for Cloud Computing”. Applied Mechanics and Materials 145, pp. 272–276, (2012). [CrossRef] [Google Scholar]
  20. C. Daniele, and H. Giles, “Cloud Computing Benefit, risk and recommendations for information security”, edited by ENISA, E.U (2009), in press. [Google Scholar]
  21. N. Brender, I. Markov, “Risk perception and risk management in cloud computing: Results from a case study of Swiss companies”. In: International Information Management 33, no (5), pp.726–733, (2013). [CrossRef] [Google Scholar]
  22. G. Grispos, T. Storer, and W.B. Glisson, “Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics”. In: International Journal of Digital Crime and Forensics, 4(2) pp.28–48, (2012). [CrossRef] [Google Scholar]
  23. B.B. Rad, T. Diaby, M.E. Rana, “Cloud Computing Adoption: A Short Review of Issues and Challenges”. ICEEG 2017: Proceedings of the 2017 International Conference on E-commerce, E-Business and E-Government, (2017). [Google Scholar]
  24. A.O. Akande, N.A. April, J.P. Van Belle. “Management issues with cloud computing”. ICCC ’13: Proceedings of the Second International Conference on Innovative Computing and Cloud Computing, (2013). [Google Scholar]
  25. A. Chandran, C.K. Shyamala, “Data Management Issues in Cloud Integrated Computing: A Big Picture”. International Conference on Advanced Computing and Communication Systems (ICACCS 2017), Coimbatore, INDIA, (2017). [Google Scholar]
  26. P. Harsh, F. Dudouet, R.G. Cascella, Y. Jegou, and C. Morin, “Using Open Standards for Interoperability Issues, Solutions, and Challenges facing Cloud Computing”. 6th International DMTF workshop on Systems and Virtualization Management (SVM 2012) / CNSM (2012). [Google Scholar]
  27. M.A. Chauhan, M.A. Babar and B. Benatallah, “Architecting cloud-enabled systems: a systematic survey of challenges and solutions”. In: Software: Practice & Experience, (2016). [Google Scholar]
  28. A. Cardoso, P. Simöes, “Cloud computing: Concepts, technologies and challenges”. ViNOrg 2011, CCIS 248, Springer-Verlag Berlin Heidelberg, pp.127–136, (2012). [Google Scholar]
  29. V. Krishna Reddy, B. Thirumal Rao,. Dr L.S.S. Reddy, P. Sai Kiran, “Research Issues in Cloud Computing” Global Journal of Computer Science and Technology, 1(11), (2011). [Google Scholar]
  30. J. Guillén, J. Miranda, Murillo J.M,, and Canal C., “A service-oriented framework for developing cross cloud migratable software,” Journal of Systems and Software, 86, pp. 2294–2308, (2013). [CrossRef] [Google Scholar]
  31. J. Opara-Martins, R. Sahandi and F. Tian, “Critical analysis of vendor lock-in and its impact on cloud computing migration: a business perspective”. In: Journal of Cloud Computing: Advances, Systems and Applications 5(4), (2016). [CrossRef] [Google Scholar]
  32. R. Sahandi, A. Alkhalil, J. Opara-Martins, “Cloud Computing from SMEs Perspective: A Survey Based Investigation”. Journal of Information Technology A Publication of the Association of Management XXIV(1), pp.1–12, (2013). [Google Scholar]
  33. K. Ullah, and M.N.A. Khan, “Security and Privacy Issues in Cloud Computing Environment: A Survey Paper.” International Journal of Grid and Distributed Computing 7(2), pp.89–98, (2014). [CrossRef] [Google Scholar]
  34. A. Caldarelli, L. Ferri and M. Maffei, “Expected benefits and perceived risks of cloud computing: an investigation within an Italian setting”. Technology Analysis & Strategic Management, 29(2), pp. 167–180, (2017). [CrossRef] [Google Scholar]
  35. R. Otuka, D. Preston and E. Pimenidis, “The use and Challenges of Cloud Computing Services in SMEs in Nigeria”. In: Proceedings of the European Conference on Information Management, pp.325, (2014). [Google Scholar]
  36. I. Senarathna, W. Yeoh, M. Warren and S. Salzman, “A Conceptual Model for Cloud Computing Adoption by SMEs in Australia”. Delivery and Adoption of Cloud Computing Services in Contemporary Organizations, pp.100–128, (2015). [CrossRef] [Google Scholar]
  37. S. Chhabra, V.S. Dixit, “Cloud Computing: State of the Art and Security Issues”. In: ACM SIGSOFT Software Engineering Notes, 40 (2), (2015). [CrossRef] [Google Scholar]
  38. R. Barona, E.A. Mary Anita, “A Survey on Data Breach Challenges in Cloud Computing Security: Issues and Threats”. In: International Conference on circuits Power and Computing Technologies [ICCPCT], (2017). [Google Scholar]
  39. J. Singh, “Study on Challenges, Opportunities and Predictions in Cloud Computing”. In: International Journal Modern Education and Computer Science, 3, pp. 17–27, (2017). [CrossRef] [Google Scholar]
  40. CSA (2010). Top ten threats in cloud computing. Cloud Security Alliance, (2010). [Google Scholar]
  41. S.M. Shariati Abouzarjomehri, M.H. Ahmadzadegan, “Challenges and security issues in cloud computing from two perspectives: Data security and privacy protection”. In: 2nd international conference on knowledge-based engineering and innovation, (2015). [Google Scholar]
  42. CSA (2013). The Notorious Nine: Cloud Computing Top Threats in 2013. Cloud Security Alliance, (2013). [Google Scholar]
  43. G. Ramachandra, M. Iftikhar, F.A. Khan, “A Comprehensive Survey on Security in Cloud Computing”. The 3rd International Workshop on Cyber Security and Digital Investigation (CSDI 2017). [Google Scholar]
  44. M. Carroll, A. Merwe, P. Kotzé, “Secure Cloud Computing Benefits, Risks and Controls”. In: Information Security South Africa (ISSA), pp. 1–9, (2011). [Google Scholar]
  45. R. Prasad Padhy, M. Ranjan Patra, S. Chandra Satapathy, “Cloud Computing: Security Issues and Research Challenges”. In: International Journal of Computer Science and Information Technology & Security, (2011). [Google Scholar]
  46. Q. Zhang, L. Cheng and R. Boutaba, “Cloud computing: state-of-the-art and research challenges”. In: Journal of Internet Services and Applications, 1(1), pp.7–18, (2010). [CrossRef] [Google Scholar]
  47. S.O. Kuyoro, F. Ibikunle and O. Awodele, “Cloud Computing Security Issues and Challenges”. In: MIPRO (2010). [Google Scholar]
  48. T. Dillon, C. Wu and E. Chang, “Cloud Computing: Issues and Challenges”. In: 24th IEEE International Conference on Advanced Information Networking and Applications, (2010). [Google Scholar]
  49. K. Mualla, D. Jenkins, “Evaluating Cloud Computing Challenges for Non-Expert Decision-Makers”. In: International Journal of Digital Information and Wireless Communications (IJDIWC) 5(4), pp. 285–296 The Society of Digital Information and Wireless Communications, (2015). [CrossRef] [Google Scholar]
  50. S. Kumar and R.H. Goudar, “Cloud Computing-Research Issues, Challenges, Architecture, Platforms and Applications: A survey”. In: International Journal of Future Computer and Communication, 1(4), (2012). [Google Scholar]
  51. J.H. Morin, J. Aubert and B. Gateau “Towards Cloud Computing SLA Risk Management: Issues and Challenges”. In: 45th Hawaii International Conference on System Sciences, (2012). [Google Scholar]
  52. K. Popović, Ž. Hocenski, “Cloud Computing security issues and challenges”. In: MIPRO (2010). [Google Scholar]
  53. O. Ali, J. Soar, J. Yong, “Challenges and Issues that are Perceived to Influence Cloud Computing Adoption in Local Government Councils”. In: Proceedings of the IEEE 21st International Conference on Computer Supported Cooperative Work in Design, (2017). [Google Scholar]
  54. A. Monjur and A.T. Litchfield “Taxonomy for Identification of Security Issues in Cloud Computing Environments”. In: Journal of Computer Information Systems, 58(1), pp.79–88, (2016), DOI: 10.1080/08874417.2016.1192520. [Google Scholar]
  55. M. Zaigham, “Data Location and Security Issues in Cloud Computing”. In: International Conference on Emerging Intelligent Data and Web Technologies, (2011). [Google Scholar]
  56. M.G. Avram (Olaru), “Advantages and challenges of adopting cloud computing from an enterprise perspective”. In: The 7th International Conference Interdisciplinarity in Engineering (INTER-ENG 2013). [Google Scholar]
  57. P. Goyal, “Enterprise Usability of Cloud Computing Environments: Issues and Challenges”. In: 2010 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, (2010). [Google Scholar]
  58. E. Cayirci, A. Garaga, A. Santana de Oliveira and Y. Roudier, “A risk assessment model for selecting cloud service providers” In: Journal of Cloud Computing: Advances, Systems and Applications, 5(14), (2016). [CrossRef] [Google Scholar]
  59. B. Gatewood, “Clouds on the information horizon: How to avoid the storm”. Information Management (15352897), 43(4), pp. 32–36, (2009). [Google Scholar]
  60. D. Yimam and E.B. Fernandez, “A survey of compliance issues in cloud computing”. In: Journal of Internet Services and Applications, 7(5), (2016). [CrossRef] [Google Scholar]
  61. H. AlJahdali, A. Albatli, P. Garraghan, P. Townend, L. Lau, J. Xu, “Multi-Tenancy in Cloud Computing”. In: IEEE 8th International Symposium on Service Oriented System Engineering, (2014). [Google Scholar]
  62. P. Saripalli, and B. Walters, “QUIRC: a quantitative impact and risk assessment framework for cloud security,” IEEE 2nd International Conference on Cloud Computing (2010). [Google Scholar]
  63. A. Wayne Jansen, “Cloud hooks: security and privacy issues in cloud computing,” Proceedings of the 44th Hawaii International Conference on System Sciences (2011). [Google Scholar]
  64. A. Duncan, S. Creese, M. Goldsmith, “Insider Attacks in Cloud Computing”. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, (2012). [Google Scholar]
  65. P. Hemant, N.P. Chawande, A. Sonule and H. Wani, “Development of servers in cloud computing to solve issues related to security and backup”. In: Proceedings of the IEEE International Conference on Cloud Computing and Intelligence Systems, pp. 158–163, (2011). [Google Scholar]
  66. O. Ali, J. Soar and J. Yong, “An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments”. In: Journal of Information Security and Applications, 27/28, pp. 19–34, (2016). [CrossRef] [Google Scholar]
  67. N. Gonzalez, C. Miers, F. Red́igolo, M. Simplicio, T. Carvalho, M. Naslund and M. Pourzandi, “A quantitative analysis of current security concerns and solutions for cloud computing”. In: Journal of Cloud Computing: Advances, Systems and Applications, 1(11), (2012). [CrossRef] [Google Scholar]
  68. R. Latif, H. Abbas, S. Assar, and Q. Ali “Cloud Computing Risk Assessment: A Systematic Literature Review”. In: Future Information Technology, Lecture Notes in Electrical Engineering, 276, pp. 285–295, (2014). [CrossRef] [Google Scholar]
  69. S. Pearson, A. Benameur, “Privacy, Security and Trust Issues Arising from Cloud Computing”. In: 2nd Int Conference on Cloud Computing Technology and Science (2010). [Google Scholar]
  70. J. Zhu, D. Li, J. Wu, H. Liu, Y. Zhang, J. Zhang, “Towards bandwidth guarantee in multitenancy cloud computing networks”. In Network Protocols (ICNP), 2012 20th IEEE International Conference, (2012). [Google Scholar]
  71. R. Buyya, S. Pandey, and C. Vecchiola, “Cloudbus toolkit for market-oriented cloud computing,” In Cloud Computing, ed: Springer, pp. 24–44, (2009). [Google Scholar]
  72. P. Belimpasakis and S. Moloney, “A platform for proving family oriented RESTful services hosted at home”. In: Consumer Electronics, IEEE Transactions on, 55, pp. 690–698, (2009). [CrossRef] [Google Scholar]
  73. A. Naim, “Cloud Computing: Technology, Security Issues and Solutions”. In: 2nd International Conference on Anti-Cyber Crimes (ICACC), (2017). [Google Scholar]
  74. A. Shawish, M. Salama, “Cloud Computing:Paradigms and Technologies”. F. Xhafa and N. Bessis (eds.), Inter-cooperative Collective Intelligence: Techniques and Applications, Studies in Computational Intelligence 495, DOI: 10.1007/978-3-642-35016-0_2, Springer-Verlag Berlin Heidelberg, (2014). [Google Scholar]
  75. G. Sumit, “Public vs Private vs Hybrid vs Community -Cloud Computing: A Critical Review”. I.J. Computer Network and Information Security, 3, pp. 20–29, (2014), DOI: 10.5815/ijcnis.2014.03.03 [Google Scholar]
  76. A. Duncan, S. Creese, M. Goldsmith, “An overview of insider attacks in cloud computing”. In: Concurrency And Computation: Practice And Experience, 27, pp. 2964–2981, (2014) in Wiley Online Library. DOI: 10.1002/cpe.3243. [CrossRef] [Google Scholar]
  77. T.K. Damenu, C. Balakrishna, “Cloud Security Risk Management A Critical Review”. In: 9th International Conference on Next Generation Mobile Applications, Services and Technologies, (2015) [Google Scholar]
  78. A. Dutta, G.C.A. Peng and A. Choudhary, “Risks in Enterprise Cloud Computing: The Perspective of it Experts”, Journal of Computer Information Systems, 53(4), pp. 39–48, (2013), DOI: 10.1080/08874417.2013.11645649 [CrossRef] [Google Scholar]
  79. M. Ahmed and A.T. Litchfield, “Taxonomy for Identification of Security Issues in Cloud Computing Environments”, Journal of Computer Information Systems, 58(1), pp. 79–88, (2018), DOI: 10.1080/08874417.2016.1192520 [CrossRef] [Google Scholar]
  80. D. Zissis, D. Lekkas, “Addressing cloud computing security issues”. Future Generation Computer Systems, 28, pp. 583–592, (2012) [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.