{"id":"https://openalex.org/W4404740224","doi":"https://doi.org/10.1109/isncc62547.2024.10758966","title":"Security Challenges and Issues in Cloud Computing","display_name":"Security Challenges and Issues in Cloud Computing","publication_year":2024,"publication_date":"2024-10-22","ids":{"openalex":"https://openalex.org/W4404740224","doi":"https://doi.org/10.1109/isncc62547.2024.10758966"},"language":"en","primary_location":{"id":"doi:10.1109/isncc62547.2024.10758966","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc62547.2024.10758966","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114815436","display_name":"Rika Zakiyyah","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rika Zakiyyah","raw_affiliation_strings":["School of Computer Science,Cyber Security Program,Computer Science Department,Jakarta,Indonesia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science,Cyber Security Program,Computer Science Department,Jakarta,Indonesia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114815437","display_name":"Daniel Permana","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Daniel Permana","raw_affiliation_strings":["School of Computer Science,Cyber Security Program,Computer Science Department,Jakarta,Indonesia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science,Cyber Security Program,Computer Science Department,Jakarta,Indonesia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010270566","display_name":"D. Valencia","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Devan Valencio","raw_affiliation_strings":["School of Computer Science,Cyber Security Program,Computer Science Department,Jakarta,Indonesia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science,Cyber Security Program,Computer Science Department,Jakarta,Indonesia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016075689","display_name":"Andry Chowanda","orcid":"https://orcid.org/0000-0002-2150-414X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Andry Chowanda","raw_affiliation_strings":["School of Computer Science,Computer Science Program,Computer Science Department,Jakarta,Indonesia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science,Computer Science Program,Computer Science Department,Jakarta,Indonesia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074119335","display_name":"Yohan Muliono","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yohan Muliono","raw_affiliation_strings":["School of Computer Science,Cyber Security Program,Computer Science Department,Jakarta,Indonesia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science,Cyber Security Program,Computer Science Department,Jakarta,Indonesia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087490560","display_name":"Zahra Nabila Izdihar","orcid":"https://orcid.org/0009-0003-0394-2095"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zahra Nabila Izdihar","raw_affiliation_strings":["School of Computer Science,Computer Science Program,Computer Science Department,Jakarta,Indonesia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science,Computer Science Program,Computer Science Department,Jakarta,Indonesia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5114815436"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.4355,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.91692232,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7616830468177795},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6838656067848206},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5088363289833069},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47110751271247864},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1531091332435608}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7616830468177795},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6838656067848206},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5088363289833069},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47110751271247864},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1531091332435608}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isncc62547.2024.10758966","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc62547.2024.10758966","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1525182673","https://openalex.org/W2903565765","https://openalex.org/W3008629209","https://openalex.org/W3011731430","https://openalex.org/W3036404574","https://openalex.org/W3109134412","https://openalex.org/W3112611240","https://openalex.org/W3116624873","https://openalex.org/W3133588187","https://openalex.org/W3134361749","https://openalex.org/W3155559132","https://openalex.org/W4200337217","https://openalex.org/W4200566240","https://openalex.org/W4206951389","https://openalex.org/W4212813292","https://openalex.org/W4220959955","https://openalex.org/W4225960923","https://openalex.org/W4241151612","https://openalex.org/W4307196249","https://openalex.org/W4312446944","https://openalex.org/W4317103359","https://openalex.org/W4362497183","https://openalex.org/W4362610988","https://openalex.org/W4384563771","https://openalex.org/W4385490337","https://openalex.org/W6822811603"],"related_works":["https://openalex.org/W2931996793","https://openalex.org/W4205234238","https://openalex.org/W3148880067","https://openalex.org/W2788934790","https://openalex.org/W3167767780","https://openalex.org/W1988660452","https://openalex.org/W3043682580","https://openalex.org/W2941559775","https://openalex.org/W3142266060","https://openalex.org/W4401658540"],"abstract_inverted_index":{"Managing":[0],"data":[1,89,98],"has":[2],"changed":[3],"significantly":[4],"because":[5],"of":[6,114,125,130,138,166,169,176],"cloud":[7,115,142,159,206],"computing,":[8],"which":[9],"offers":[10],"scalabe,":[11],"flexible":[12],"and":[13,19,28,93,103,110,119,145,151,156,171,195],"reasonably":[14],"priced":[15],"solutions":[16],"to":[17,20,33,81,134,146,179],"enterprises":[18],"people":[21],"as":[22,25,49,60,86],"well":[23,201],"such":[24,41,48,59,85],"Amazon,":[26],"Google,":[27],"Microsoft":[29],"expanding":[30],"their":[31,196],"infrastructure":[32],"meet":[34],"the":[35,38,126,131,139,167,177,180,183,186],"demand":[36],"from":[37,182],"customer.":[39],"With":[40],"advantages":[42],"there":[43],"will":[44,54,75],"also":[45,76],"be":[46],"disadvantages":[47],"security":[50,57,79,117,144,154],"problems.":[51],"This":[52,73,107],"paper":[53,74],"discuss":[55],"about":[56,78],"problems":[58],"encryption,":[61],"access":[62],"control,":[63],"multi-factor":[64],"authentication,":[65],"regular":[66],"audits,":[67],"secure":[68],"configurations,":[69],"incident":[70],"response":[71],"planning.":[72],"talk":[77],"measures":[80],"deal":[82],"with":[83],"threats":[84,155],"malicious":[87],"insiders,":[88],"abuse,":[90],"unsecured":[91],"interfaces":[92],"APIs,":[94],"shared":[95],"technology":[96],"complications,":[97],"loss":[99],"or":[100],"leakage,":[101],"hijacking,":[102],"enigmatic":[104],"risk":[105],"profiles.":[106],"study":[108],"examines":[109],"evaluates":[111],"a":[112,122,190],"range":[113],"computing":[116,143,160],"concerns":[118],"issues":[120],"through":[121,199],"systematic":[123],"analysis":[124],"literature.":[127],"The":[128],"goal":[129],"research":[132,170],"is":[133,174],"raise":[135],"public":[136],"awareness":[137],"need":[140],"for":[141],"offer":[147],"possible":[148],"remedies.":[149],"Identify":[150],"classify":[152],"network":[153,203],"vulnerabilities":[157,194],"in":[158,205],"by":[161],"doing":[162],"an":[163],"extensive":[164],"examination":[165],"body":[168],"empirical":[172],"investigations":[173],"one":[175],"answer":[178],"questions":[181],"paper.":[184],"In":[185],"end,":[187],"this":[188],"take":[189],"look":[191],"at":[192],"unearths":[193],"practical":[197],"implications":[198],"very":[200],"reading":[202],"safety":[204],"computing.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
