{"id":"https://openalex.org/W4407628222","doi":"https://doi.org/10.1109/acit62805.2024.10877035","title":"Cloud Security: Analyzing Threats and Challenges","display_name":"Cloud Security: Analyzing Threats and Challenges","publication_year":2024,"publication_date":"2024-12-10","ids":{"openalex":"https://openalex.org/W4407628222","doi":"https://doi.org/10.1109/acit62805.2024.10877035"},"language":"en","primary_location":{"id":"doi:10.1109/acit62805.2024.10877035","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit62805.2024.10877035","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 25th International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079544101","display_name":"Mahmoud Rajallah Asassfeh","orcid":null},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Mahmoud Rajallah Asassfeh","raw_affiliation_strings":["Zarqa University,Department of Cybersecurity,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032619601","display_name":"Esraa Abu Elsoud","orcid":"https://orcid.org/0009-0000-0796-8522"},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Esraa Abu Elsoud","raw_affiliation_strings":["Zarqa University,Department of Computer Science,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Department of Computer Science,Zarqa,Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116291923","display_name":"Sultan Mohammed Albilasi","orcid":null},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Sultan Mohammed Albilasi","raw_affiliation_strings":["Zarqa University,Department of Cybersecurity,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086045881","display_name":"Abdullah Alqammaz","orcid":null},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Abdullah Alqammaz","raw_affiliation_strings":["Zarqa University,Department of Cybersecurity,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047001244","display_name":"Ala\u2019a Al-Shaikh","orcid":"https://orcid.org/0000-0002-1888-759X"},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ala\u2019a Al-Shaikh","raw_affiliation_strings":["Zarqa University,Department of Cybersecurity,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076363726","display_name":"Suha Afaneh","orcid":"https://orcid.org/0009-0009-0126-7157"},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Suha Afaneh","raw_affiliation_strings":["Zarqa University,Department of Cybersecurity,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049791781","display_name":"Ahmad Bany Doumi","orcid":null},"institutions":[{"id":"https://openalex.org/I48714440","display_name":"Jerash University","ror":"https://ror.org/047mw5m74","country_code":"JO","type":"education","lineage":["https://openalex.org/I48714440"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ahmad Bany Doumi","raw_affiliation_strings":["Jerash University,Department of Computer Science,Jerash,Jordan"],"affiliations":[{"raw_affiliation_string":"Jerash University,Department of Computer Science,Jerash,Jordan","institution_ids":["https://openalex.org/I48714440"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040109082","display_name":"Ali Elrashidi","orcid":"https://orcid.org/0000-0002-8560-1395"},"institutions":[{"id":"https://openalex.org/I4210165529","display_name":"University of Business and Technology","ror":"https://ror.org/05tcr1n44","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210165529"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ali Elrashidi","raw_affiliation_strings":["University of Business and Technology,Department of Electrical Engineering,Jeddah,Saudi Arabia,21432"],"affiliations":[{"raw_affiliation_string":"University of Business and Technology,Department of Electrical Engineering,Jeddah,Saudi Arabia,21432","institution_ids":["https://openalex.org/I4210165529"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020925471","display_name":"Ghassan Samara","orcid":"https://orcid.org/0000-0001-8415-0572"},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ghassan Samara","raw_affiliation_strings":["Zarqa University,Department of Computer Science,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Department of Computer Science,Zarqa,Jordan","institution_ids":["https://openalex.org/I153687341"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5079544101"],"corresponding_institution_ids":["https://openalex.org/I153687341"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32103093,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9769999980926514,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9769999980926514,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6356684565544128},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6291108131408691},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5165587663650513},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4504458010196686},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06028640270233154}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6356684565544128},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6291108131408691},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5165587663650513},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4504458010196686},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06028640270233154}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit62805.2024.10877035","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit62805.2024.10877035","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 25th International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320326306","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1670960170","https://openalex.org/W2040295146","https://openalex.org/W2074701325","https://openalex.org/W2332486886","https://openalex.org/W2346221746","https://openalex.org/W2547501962","https://openalex.org/W2608203916","https://openalex.org/W2933527483","https://openalex.org/W2945132367","https://openalex.org/W2947830641","https://openalex.org/W3016177658","https://openalex.org/W3043853389","https://openalex.org/W4205670975","https://openalex.org/W4285740954","https://openalex.org/W4362613093","https://openalex.org/W4366439767","https://openalex.org/W4378448044","https://openalex.org/W4380449766","https://openalex.org/W4381798742","https://openalex.org/W4382133127","https://openalex.org/W4383101691","https://openalex.org/W4384469965","https://openalex.org/W4384563771","https://openalex.org/W4386010748","https://openalex.org/W4386246839","https://openalex.org/W4386286067","https://openalex.org/W4387877841","https://openalex.org/W4390177009","https://openalex.org/W4391234651","https://openalex.org/W4391261145","https://openalex.org/W4392081953","https://openalex.org/W4392204822","https://openalex.org/W4393005289","https://openalex.org/W4393205793","https://openalex.org/W4396772691","https://openalex.org/W4399118748","https://openalex.org/W4400072025","https://openalex.org/W4400205894","https://openalex.org/W4400255675","https://openalex.org/W4400812601","https://openalex.org/W4400977245","https://openalex.org/W4401015457","https://openalex.org/W4401388196","https://openalex.org/W4402381970","https://openalex.org/W6630334249","https://openalex.org/W6786729703"],"related_works":["https://openalex.org/W2931996793","https://openalex.org/W4205234238","https://openalex.org/W3148880067","https://openalex.org/W2788934790","https://openalex.org/W3167767780","https://openalex.org/W1988660452","https://openalex.org/W3043682580","https://openalex.org/W2941559775","https://openalex.org/W3142266060","https://openalex.org/W4401658540"],"abstract_inverted_index":{"The":[0],"rapid":[1,35],"embrace":[2],"of":[3,37,43,65,78,96,124],"cloud":[4,18,58,66,88,91],"computing":[5,89,92],"has":[6],"changed":[7],"the":[8,57,62,79],"IT":[9],"environment,":[10],"providing":[11],"unmatched":[12],"scalability,":[13],"adaptability,":[14],"and":[15,29,53,60,84,110,127],"cost-effectiveness,":[16],"since":[17,90],"services":[19],"brought":[20],"in":[21,27],"around":[22],"631.84":[23],"billion":[24],"dollars":[25],"globally":[26],"2023,":[28],"they":[30],"will":[31],"expand":[32],"at":[33],"a":[34],"rate":[36],"18.49%":[38],"through":[39],"2029.":[40],"With":[41],"45.58%":[42],"global":[44],"revenues.":[45],"Nevertheless,":[46],"as":[47,107],"companies":[48],"move":[49],"their":[50],"essential":[51],"operations":[52],"sensitive":[54],"information":[55],"to":[56,87,102,116],"more":[59],"more,":[61],"shared":[63],"nature":[64],"environments":[67],"creates":[68],"important":[69],"security":[70,80],"challenges.":[71],"This":[72],"paper":[73],"presents":[74],"an":[75],"extensive":[76],"examination":[77],"vulnerabilities,":[81],"challenges,":[82],"strategies,":[83],"countermeasures":[85],"pertinent":[86],"includes":[93],"several":[94],"types":[95],"administration":[97],"that":[98],"are":[99],"made":[100],"available":[101],"service":[103,125],"users":[104],"online,":[105],"such":[106],"programming,":[108],"gathering,":[109],"coordinating":[111],"equipment":[112],"resources.it":[113],"is":[114],"necessary":[115],"safeguard":[117],"this":[118],"data":[119],"from":[120],"threats":[121],"like":[122],"denial":[123],"attacks":[126],"unauthorized":[128],"access.":[129]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
