Model of security level classification for data in hybrid cloud computing
Organizations mainly rely on data and the mechanism of dealing with that data on cloud computing. Data in an organization has multi security levels, which is classified depending on nature of the data, and the impact of data on the organization. The security procedures which used for protecting data...
| Main Authors: | Shakir, Mohanaad, Asmidar, Abubakar, Yousoff, Younus, Waseem, Mohammed, Al-Emran, Mostafa |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
JATIT
2016
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/29213/ http://umpir.ump.edu.my/id/eprint/29213/1/Model%20of%20security%20level%20classification%20for%20data%20in%20hybrid.pdf |
Similar Items
Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing
by: Mohanaad, Shakir, et al.
Published: (2016)
by: Mohanaad, Shakir, et al.
Published: (2016)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
by: Eldow, Abdalla, et al.
Published: (2019)
by: Eldow, Abdalla, et al.
Published: (2019)
Security and accountability for sharing the data stored in the cloud
by: Mohammed, Mostafa Abdulghafoor, et al.
Published: (2016)
by: Mohammed, Mostafa Abdulghafoor, et al.
Published: (2016)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Aligning cloud computing security with business strategy
by: Mohamed Hassan El-Hoby, Hany, et al.
Published: (2014)
by: Mohamed Hassan El-Hoby, Hany, et al.
Published: (2014)
SLA-based trust model for secure cloud computing
by: Alhamad, Mohammed
Published: (2011)
by: Alhamad, Mohammed
Published: (2011)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
by: Sookhak, Mehdi
Published: (2015)
by: Sookhak, Mehdi
Published: (2015)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)
by: Jaber, Aws Naser, et al.
Published: (2015)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
A multi-level framework for efficient sensitive data transmission in cloud computing
by: Muhasin, Haifaa Jassim
Published: (2019)
by: Muhasin, Haifaa Jassim
Published: (2019)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
Critical security challenges in cloud computing environment: An appraisal
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
Big Data Processing in Cloud Computing Environments
by: Noraziah, Ahmad, et al.
Published: (2017)
by: Noraziah, Ahmad, et al.
Published: (2017)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
Hybrid High Performance Computing (HPC) + Cloud for Scientific
Computing
by: Balakrishnan, Suresh Reuben A/L
Published: (2022)
by: Balakrishnan, Suresh Reuben A/L
Published: (2022)
Factors Influencing the Continuous Use of Cloud Computing Services in Organization Level
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
Study of Security Layers Under Attack on Different Layers of Cloud Computing
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
Organizational level continuance model of cloud computing for higher education institutions
by: Mohammed, Qasem Yousef Abdulelah
Published: (2021)
by: Mohammed, Qasem Yousef Abdulelah
Published: (2021)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Cloud computing security threat with quantum key distribution defense model
by: Khalid, Roszelinda, et al.
Published: (2015)
by: Khalid, Roszelinda, et al.
Published: (2015)
SSM: Secure-Split-Merge data distribution in cloud infrastructure
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
Risk assessment for big data in cloud:security, privacy and trust
by: Yusof Ali, Hazirah Bee, et al.
Published: (2018)
by: Yusof Ali, Hazirah Bee, et al.
Published: (2018)
Security framework of cloud data storage based on multi agent.
by: Mohamed Talib, Amir, et al.
Published: (2010)
by: Mohamed Talib, Amir, et al.
Published: (2010)
An efficient crime group of secured data sharing scheme in cloud
by: Rashid, Mustafa Noori
Published: (2018)
by: Rashid, Mustafa Noori
Published: (2018)
Framework design for secured local cloud data query processing analysis
by: Mohd Aman, Azana Hafizah, et al.
Published: (2019)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2019)
A security-based survey and classification of cloud architectures, state of the art and future directions
by: Waqas, Ahmad, et al.
Published: (2013)
by: Waqas, Ahmad, et al.
Published: (2013)
Intersection of geospatial big data, geocomputation and cloud computing
by: Amirian, Pouria, et al.
Published: (2015)
by: Amirian, Pouria, et al.
Published: (2015)
The factors affecting on managing sensitive data in cloud computing
by: Jassim Muhasin, Haifaa, et al.
Published: (2018)
by: Jassim Muhasin, Haifaa, et al.
Published: (2018)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
Improve cloud computing security using RSA encryption with Fermat's little theorem
by: Mohamed Shereek, Balkees, et al.
Published: (2014)
by: Mohamed Shereek, Balkees, et al.
Published: (2014)
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)
by: Abd Majid, Noorhafezan
Published: (2019)
Blockchain-enabled cloud services for secure and transparent data management in SMEs
by: Ali, Abdifatah Farah, et al.
Published: (2024)
by: Ali, Abdifatah Farah, et al.
Published: (2024)
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Similar Items
-
Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing
by: Mohanaad, Shakir, et al.
Published: (2016) -
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014) -
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016) -
Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
by: Eldow, Abdalla, et al.
Published: (2019) -
Security and accountability for sharing the data stored in the cloud
by: Mohammed, Mostafa Abdulghafoor, et al.
Published: (2016)