{"id":"https://openalex.org/W2752294605","doi":"https://doi.org/10.3233/978-1-61499-796-2-175","title":"Security Issues and Solutions in Cloud Computing","display_name":"Security Issues and Solutions in Cloud Computing","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2752294605","doi":"https://doi.org/10.3233/978-1-61499-796-2-175","mag":"2752294605"},"language":"en","primary_location":{"id":"doi:10.3233/978-1-61499-796-2-175","is_oa":true,"landing_page_url":"https://doi.org/10.3233/978-1-61499-796-2-175","pdf_url":null,"source":{"id":"https://openalex.org/S4210168452","display_name":"Ambient intelligence and smart environments","issn_l":"1875-4163","issn":["1875-4163","1875-4171"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"book series"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ambient Intelligence and Smart Environments","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.3233/978-1-61499-796-2-175","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116306509","display_name":"Xie Yujie","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xie Yujie","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116306510","display_name":"Lee Yeonju","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lee Yeonju","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018255165","display_name":"Kim Kwangmin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kim Kwangmin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5061116975","display_name":"Pankoo Kim","orcid":"https://orcid.org/0000-0003-0111-5152"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kim Pankoo","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5116306509"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15056447,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.944100022315979,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.944100022315979,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7900072336196899},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.504743218421936},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4303795099258423},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15169420838356018}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7900072336196899},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.504743218421936},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4303795099258423},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15169420838356018}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/978-1-61499-796-2-175","is_oa":true,"landing_page_url":"https://doi.org/10.3233/978-1-61499-796-2-175","pdf_url":null,"source":{"id":"https://openalex.org/S4210168452","display_name":"Ambient intelligence and smart environments","issn_l":"1875-4163","issn":["1875-4163","1875-4171"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"book series"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ambient Intelligence and Smart Environments","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/978-1-61499-796-2-175","is_oa":true,"landing_page_url":"https://doi.org/10.3233/978-1-61499-796-2-175","pdf_url":null,"source":{"id":"https://openalex.org/S4210168452","display_name":"Ambient intelligence and smart environments","issn_l":"1875-4163","issn":["1875-4163","1875-4171"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"book series"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ambient Intelligence and Smart Environments","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4244478748","https://openalex.org/W3150465815","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W1997222214","https://openalex.org/W2560439919"],"abstract_inverted_index":{"The":[0],"leap":[1],"development":[2,80],"of":[3,20,41,54,81,150],"Internet":[4,21,60],"gives":[5],"computer":[6,42],"science":[7],"infinite":[8],"possibility.":[9],"Meanwhile,":[10],"the":[11,25,39,71,78,85,112,148,161,181,193],"emerging":[12],"cloud":[13,82,89,93,103,139,151,155,168,182],"computing":[14,104,115,152,183],"has":[15,95],"become":[16],"a":[17,31,52,99,108],"tremendous":[18],"boost":[19],"innovation.":[22],"It":[23],"alters":[24],"traditional":[26],"IT":[27],"service":[28,33,48,172],"models":[29],"to":[30,58,70,119,134],"remote":[32],"and":[34,56,75,91,126,170,178,186],"provides":[35],"massive":[36],"storage":[37],"without":[38],"limitation":[40],"processing":[43,87],"capacity.":[44],"This":[45],"unique":[46],"storing":[47],"paradigm":[49],"apparently":[50],"brings":[51],"series":[53],"benefits":[55],"convenience":[57],"most":[59],"enterprises":[61],"especially":[62],"start-ups.":[63],"However,":[64],"few":[65],"attentions":[66],"have":[67],"been":[68,96],"paid":[69],"potential":[72],"security":[73,94,156,176],"issues":[74],"challenges":[76,179],"with":[77],"rapid":[79],"computing.":[83],"During":[84],"frequent":[86],"between":[88],"providers":[90],"users,":[92],"cited":[97],"as":[98,102,123],"vital":[100],"problem":[101],"outputs":[105],"data":[106,124],"in":[107,138,160,180,192],"virtual":[109],"environment":[110],"through":[111],"internet.":[113],"Virtual":[114],"is":[116,158],"more":[117],"vulnerable":[118],"various":[120],"attacks":[121],"such":[122],"loss":[125],"leakage.":[127],"Hence,":[128],"comprehensive":[129],"solutions":[130,188],"are":[131,184,189],"significantly":[132],"necessary":[133],"solve":[135],"these":[136],"problems":[137],"systems.":[140],"In":[141],"this":[142],"paper,":[143],"we":[144],"will":[145],"briefly":[146],"introduce":[147],"definition":[149],"firstly.":[153],"And":[154],"structure":[157],"given":[159],"second":[162],"part,":[163],"which":[164],"includes":[165],"three":[166,171],"main":[167],"types":[169],"models.":[173],"Moreover,":[174],"crucial":[175],"threats":[177],"illustrated":[185],"corresponding":[187],"proposed":[190],"accordingly":[191],"last":[194],"part.":[195]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
