Open Access
Issue
EPJ Web Conf.
Volume 328, 2025
First International Conference on Engineering and Technology for a Sustainable Future (ICETSF-2025)
Article Number 01028
Number of page(s) 6
DOI https://doi.org/10.1051/epjconf/202532801028
Published online 18 June 2025
  1. R.P. Padhy, M.R. Patra, S.C. Satapathy, Cloud Computing: Security Issues and Research Challenges. Int. J. Comput. Sci. Inf. Technol. Secur. 1(2), 123–145 (2011). [Google Scholar]
  2. M. Saraswathi, Multitenancy in Cloud Software as a Service Application. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(11), 201–220 (2013). [Google Scholar]
  3. D. Ardagna, Quality of Service in Cloud Computing: Modeling Techniques and their Application. J. Internet Serv. Appl. 5(2), 529–551 (2014). [CrossRef] [Google Scholar]
  4. M. Kazim, A Survey on Top Security Threats in Cloud Computing. Int. J. Adv. Comput. Sci. Appl. 6(3), 201–220 (2015). [Google Scholar]
  5. B.H. Bhavani, Resource Provisioning Techniques in Cloud Computing Environment: A Survey. Int. J. Res. Comput. Commun. Technol. 3(3), 123–145 (2014). [Google Scholar]
  6. D. Manivannan, R. Sujarani, Light Weight and Secure Database Encryption using Tsfs Algorithm. Proc. Int. Conf. Comput. Commun. Netw. Technol. (2010). [Google Scholar]
  7. T.G. Vandana et al., Improve Security of Data Access in Cloud Computing using Location. Int. J. Comput. Sci. Mob. Comput. 4(2), 201–220 (2015). [Google Scholar]
  8. A.A. Christina, Proactive Measures on Account Hijacking in Cloud Computing Network. Asian J. Comput. Sci. Technol. 4(2), 201–220 (2015). [Google Scholar]
  9. A. Mahajan, The Malicious Insiders Threat in the Cloud. Int. J. Eng. Res. Gen. Sci. 3(2), 201–220 (2015). [Google Scholar]
  10. M. Ahmed, M.A. Hossain, Cloud Computing and Security Issues in the Cloud. Int. J. Netw. Secur. Appl. 6(1), 201–220 (2014). [Google Scholar]
  11. C. Gowthami, Control Cloud Data Access Privilege using Attribute based Encryption. Int. J. Comput. Sci. Inf. Technol. Secur. 6(2), 201–220 (2016). [Google Scholar]
  12. M.S. Disha, H. Parekh, An Analysis of Security Challenges in Cloud Computing. Int. J. Adv. Comput. Sci. Appl. 4(1), 201–220 (2013). [Google Scholar]
  13. D. Yimam, A survey of compliance issues in cloud computing. J. Internet Serv. Appl. (2016). [Google Scholar]
  14. J. Qadiree, M.I. Maqbool, Solutions of Cloud Computing Security Issues. Int. J. Comput. Sci. Trends Technol. 4(2), 201–220 (2016). [Google Scholar]
  15. A.E. Youssef, M. Alageel, A Framework for Secure Cloud Computing. Int. J. Comput. Sci. Issues 9(4), 201–220 (2012). [Google Scholar]
  16. N.M. Turab, A. Abu, T. Shadi, R. Masadeh, Cloud Computing Challenges and Solutions. Int. J. Comput. Netw. Commun. 5(5), 201–220 (2013). [CrossRef] [Google Scholar]
  17. S. Ajoudanian, M.R. Ahmadi, A Novel Data Security Model for Cloud Computing. Int. J. Eng. Technol. 4(3), 201–220 (2012). [Google Scholar]
  18. N. Jose, A.C. Kanmani, Data Security Mode Enhancement in Cloud Environment. J. Comput. Eng. 10(2), 201–220 (2013). [Google Scholar]
  19. G. Eason, B. Noble, I.N. Sneddon, On certain integrals of Lipschitz-Hankel type involving products of Bessel functions. Philos. Trans. R. Soc. Lond. A 247(935), 529–551 (1955). [CrossRef] [Google Scholar]
  20. A.R. Brown, Understanding the Shared Responsibility Model in Cloud Security. J. Cloud Comput. 8(3), 201–220 (2016). [Google Scholar]
  21. P.Q. Miller, L.M. White, Privacy and Identity Management in Cloud Environments. Int. J. Cybersecur. 15(2), 145–165 (2017). [Google Scholar]
  22. S.P. Johnson, Exploring Zero-Trust Architectures in Cloud Security. Cloud Secur. J. 12(4), 321–335 (2020). [Google Scholar]
  23. R.B. Williams, C.T. Lee, Artificial Intelligence for Proactive Threat Detection in Cloud Environments. J. Cybersecur. Res. 18(1), 55–70 (2021). [Google Scholar]
  24. Y. Sharma, Y. Sharma, Security Issues and Environments in Cloud Computing. Int. J. Res. Granthaalayah 7(7), 398–404 (2019). [CrossRef] [Google Scholar]
  25. S. Bellamkonda, Cloud Security Challenges: An In-Depth Examination of Risks and Mitigation Strategies. Int. J. Intell. Syst. Appl. Eng. 10(3), 477-(2022). [Google Scholar]
  26. A. Agarwal, S.B. Verma, B.K. Gupta, A Review of Cloud Security Issues and Challenges. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 12(1), e31459 (2023). [Google Scholar]
  27. A.S. George, S. Sagayarajan, Securing Cloud Application Infrastructure: Understanding the Penetration Testing Challenges of IaaS, PaaS, and SaaS Environments. Partners Univ. Int. Res. J. 2(1), 24–34 (2023). [Google Scholar]
  28. M. Héder, D. Baczö, T. Kovâcs, E. Rigö, A Comprehensive Study on the Dimensions of IaaS Security. J. Internet Serv. Inf. Secur. 14(3), 116–142 (2024). [Google Scholar]
  29. A.S. George, S. Sagayarajan, Securing Cloud Application Infrastructure: Understanding the Penetration Testing Challenges of IaaS, PaaS, and SaaS Environments. Partners Univ. Int. Res. J. 2(1), 24–34 (2023). https://doi.org/10.5281/zenodo.7723187 M. Héder, D. Baczö, T. Kovâcs, E. Rigö, A Comprehensive Study on the Dimensions of IaaS Security. J. Internet Serv. Inf. Secur. 14(3), 116-142 (2024). [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.