Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

jsan-logo

Article Menu

  • Subscribe SciFeed
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Featured papers on network security and privacy.

literature review of network security

1. Introduction

2. an overview of published articles, 3. conclusions, conflicts of interest.

  • Antony, S.N.F.M.A.; Bahari, M.F.A. Implementation of Elliptic Curves in the Polynomial Blom Key Pre-Distribution Scheme for Wireless Sensor Networks and Distributed Ledger Technology. J. Sens. Actuator Netw. 2023 , 12 , 15. [ Google Scholar ] [ CrossRef ]
  • Aljabri, M.; Alahmadi, A.A.; Mohammad, R.M.A.; Alhaidari, F.; Aboulnour, M.; Alomari, D.M.; Mirza, S. Machine Learning-Based Detection for Unauthorized Access to IoT Devices. J. Sens. Actuator Netw. 2023 , 12 , 27. [ Google Scholar ] [ CrossRef ]
  • Almuhaideb, A.M.; Aslam, N.; Alabdullatif, A.; Altamimi, S.; Alothman, S.; Alhussain, A.; Aldosari, W.; Alsunaidi, S.J.; Alissa, K.A. Homoglyph Attack Detection Model Using Machine Learning and Hash Function. J. Sens. Actuator Netw. 2022 , 11 , 54. [ Google Scholar ] [ CrossRef ]
  • Almuhaideb, A.M.; Algothami, S.S. Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV. J. Sens. Actuator Netw. 2022 , 11 , 28. [ Google Scholar ] [ CrossRef ]
  • Mannix, K.; Gorey, A.; O’Shea, D.; Newe, T. Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them. J. Sens. Actuator Netw. 2022 , 11 , 43. [ Google Scholar ] [ CrossRef ]
  • Alzahrani, R.A.; Aljabri, M. AI-Based Techniques for Ad Click Fraud Detection and Prevention: Review and Research Directions. J. Sens. Actuator Netw. 2023 , 12 , 4. [ Google Scholar ] [ CrossRef ]
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

Mongay Batalla, J. Featured Papers on Network Security and Privacy. J. Sens. Actuator Netw. 2024 , 13 , 11. https://doi.org/10.3390/jsan13010011

Mongay Batalla J. Featured Papers on Network Security and Privacy. Journal of Sensor and Actuator Networks . 2024; 13(1):11. https://doi.org/10.3390/jsan13010011

Mongay Batalla, Jordi. 2024. "Featured Papers on Network Security and Privacy" Journal of Sensor and Actuator Networks 13, no. 1: 11. https://doi.org/10.3390/jsan13010011

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

To read this content please select one of the options below:

Please note you do not have access to teaching notes, literature review on network security in wireless mobile ad-hoc network for iot applications: network attacks and detection mechanisms.

International Journal of Intelligent Unmanned Systems

ISSN : 2049-6427

Article publication date: 21 September 2021

Issue publication date: 22 November 2022

Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine with the IoT via the sensing capability of Internet-connected devices and the Internet access ability of sensor nodes. It is essential to shelter the network from attacks over the Internet by keeping the secure router.

Design/methodology/approach

This paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT) applications. The literature review is focused on various types of attacks concentrated in each contribution and the adoption of prevention and mitigation models are observed. In addition, the types of the dataset used, types of attacks concentrated, types of tools used for implementation, and performance measures analyzed in each contribution are analyzed. Finally, an attempt is made to conclude the review with several future research directions in designing and implementing IDS for MANETs that preserve the security aspects of IoT.

It observed the different attack types focused on every contribution and the adoption of prevention and mitigation models. Additionally, the used dataset types, the focused attack types, the tool types used for implementation, and the performance measures were investigated in every contribution.

Originality/value

This paper presents a literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications.

  • Network security
  • Wireless sensor network
  • Mobile ad-hoc network
  • IoT applications
  • Network attacks
  • Intrusion detection system

Acknowledgements

The author would like to thank R. Narmadha for her support and constructive suggestions during the planning and development of this research work and would like to express appreciation for her willingness to give her valuable time. Also the author wishes to thank the author’s family for their support and encouragement throughout this work.

Funding : None.

Pamarthi, S. and Narmadha, R. (2022), "Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms", International Journal of Intelligent Unmanned Systems , Vol. 10 No. 4, pp. 482-506. https://doi.org/10.1108/IJIUS-05-2021-0028

Emerald Publishing Limited

Copyright © 2021, Emerald Publishing Limited

Related articles

All feedback is valuable.

Please share your general feedback

Report an issue or find answers to frequently asked questions

Contact Customer Support

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

This week: the arXiv Accessibility Forum

Help | Advanced Search

Computer Science > Cryptography and Security

Title: a systematic literature review on 5g security.

Abstract: It is expected that the creation of next-generation wireless networks would result in the availability of high-speed and low-latency connectivity for every part of our life. As a result, it is important that the network is secure. The network's security environment has grown more complicated as a result of the growing number of devices and the diversity of services that 5G will provide. This is why it is important that the development of effective security solutions is carried out early. Our findings of this review have revealed the various directions that will be pursued in the development of next-generation wireless networks. Some of these include the use of Artificial Intelligence and Software Defined Mobile Networks. The threat environment for 5G networks, security weaknesses in the new technology paradigms that 5G will embrace, and provided solutions presented in the key studies in the field of 5G cyber security are all described in this systematic literature review for prospective researchers. Future research directions to protect wireless networks beyond 5G are also covered.
Subjects: Cryptography and Security (cs.CR)
Cite as: [cs.CR]
  (or [cs.CR] for this version)
  Focus to learn more arXiv-issued DOI via DataCite

Submission history

Access paper:.

  • Other Formats

license icon

References & Citations

  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

A Review on Network Security

  • This person is not on ResearchGate, or hasn't claimed this research yet.

Rizwan Khan at ABES Institute of Technology

  • ABES Institute of Technology

Abstract and Figures

literature review of network security

Discover the world's research

  • 25+ million members
  • 160+ million publication pages
  • 2.3+ billion citations
  • Kurdistan Regional Government
  • Hazha Khatab Rasul
  • Erbil - Kurdistan
  • ABDELOUAHED BAMOU
  • Recruit researchers
  • Join for free
  • Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up

A systematic literature review of security software defined network: research trends, threat, attack, detect, mitigate, and countermeasure

New citation alert added.

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Please log in to your account

Information & Contributors

Bibliometrics & citations.

  • Kurniawan M Fathinuddin M Widiyanti H Simanjuntak G (2021) Network Slicing on SDN using FlowVisor and POX Controller to Traffic Isolation Enforcement 2021 International Conference on Engineering and Emerging Technologies (ICEET) 10.1109/ICEET53442.2021.9659765 (1-6) Online publication date: 27-Oct-2021 https://doi.org/10.1109/ICEET53442.2021.9659765
  • Yurekten O Demirci M (2021) SDN-based cyber defense Future Generation Computer Systems 10.1016/j.future.2020.09.006 115 :C (126-149) Online publication date: 1-Feb-2021 https://dl.acm.org/doi/10.1016/j.future.2020.09.006

Index Terms

Security and privacy

Network security

Recommendations

Systematic literature review on usability of firewall configuration.

Firewalls are network security components that handle incoming and outgoing network traffic based on a set of rules. The process of correctly configuring a firewall is complicated and prone to error, and it worsens as the network complexity grows. A ...

Towards a systematic survey of industrial IoT security requirements: research method and quantitative analysis

Industry 4.0 and, in particular, Industrial Internet of Things (IIoT) represent two of the major automation and data exchange trends of the 21 st century, driving a steady increase in the number of smart embedded devices used by industrial applications. ...

A Systematic Security Assessment and Review of Internet of Things in the Context of Authentication

The Internet of Things is emerging globally as an intriguing trend expected to connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation to various application domains provides a plethora of ...

Information

Published in.

cover image ACM Other conferences

  • Conference Chairs:

Tokyo University of Science, Japan

Shanghai Jiao Tong University, China

Association for Computing Machinery

New York, NY, United States

Publication History

Permissions, check for updates, author tags.

  • software defined network
  • systematic literature review
  • Research-article

Contributors

Other metrics, bibliometrics, article metrics.

  • 2 Total Citations View Citations
  • 465 Total Downloads
  • Downloads (Last 12 months) 33
  • Downloads (Last 6 weeks) 1

View Options

Login options.

Check if you have access through your login credentials or your institution to get full access on this article.

Full Access

View options.

View or Download as a PDF file.

View online with eReader .

Share this Publication link

Copying failed.

Share on social media

Affiliations, export citations.

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

Literature Review on Cryptography and Network Security

Profile image of Daniel L Calloway

This literature review looks at the research that has been published in the area of cryptography as it relates to network data and global communications security. It compares and contrasts the research pointing out overall trends in what has already been published on this subject. It analyzes the role that cryptography has played and will play in the future relative to security. This review addresses cryptography around the central theme of the security that it provides or should provide individuals, corporations, and others in the modern age of computing technology, networking, and Web-based ecommerce. By reviewing both scholarly and non-scholarly works, it is our objective to make a case that continuing research into the use of cryptography is paramount in preserving the future of electronic data security and privacy as well as the continuing development of Web-based applications that will permit the growth of ecommerce business worldwide to be conducted over the Internet.

Related Papers

Mahamaya Technical University

Ajay Bhushan

The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems. This work specifies the functionality of TORDES fro encryption and decryption to protect the sensitive unclassified data. TORDES is made available within the context of a total security program consisting of physical security procedure. In the absence of generally acknowledged metrics in the public area that could be used to compute and spell out cryptographic strength, a small operational group agreed to look at the possibility of developing an approach to cryptographic metrics The purpose of this dissertation is to report the results of the limited exploratory effort by the above operational group that investigated the practicality of developing metrics for use in specifying the strength of cryptographic algorithms. This work is only deals with a small sample of selected symmetric cipher block encryption algorithms. The selective application of technological and related procedural safeguard is an important responsibility of every cryptographic algorithm in providing adequate security to its electronic data systems. This work specifies TORDES including its primary component, cryptographic engines, MODDES, DES, TDES, AES to compare in terms of memory required and encryption, decryption time. In today's epoch, most of the means of secure data and code storage and distribution rely on using cryptographic Schemes, such as certificates or encryption keys. This dissertation is devoted to the security and attack aspects of cryptographic techniques with new symmetric key algorithm TORDES. This algorithm is proposed to achieve the different goals of security i.e., Availability, Confidentiality and Integrity. We will also discuss the security threats in this algorithm. Security is a very complex and vast topic. There is such a tool available in market which easily crack the conventional cryptographic data. It is necessary to design such a Algorithm which approach a different from these algorithms. TORDES is the one of best direction in this approach. The proposed system is successfully tested on text. The performance and security provided by proposed system is better than other secret key algorithm for the message of fixed size. The main advantage of proposed system is that it is not fully dependent on the key and for the same plain text it produces different modified secure codes

literature review of network security

maurice kabeireho

Journal of Computer Security

Anna Squicciarini

John Gerdes

5G communication technology works with the integration of several technologies viz. Cloud Computing, network partitioning and software based networks. This integration allows the communication between thousands of device across the world which have enormous issues related to data protection, data authenticity, and data confidentiality. So, there is an immense need of secure protocols to face or resolve security related issues related to design and operation of 5G network. Moreover, some structured cryptography protocols required to develop and accomplish data security in 5G communication. The study focussing on the comprehensive consequences of quantum computing on security implementations of 5G mobile communications. The study discussing about the cryptographic algorithm used in 5G, and what are the various consequences of involvement of quantum computing.

Abdullah Rashed , Henrique Santos

In the Electronic Society (e-world) users are represented by a set of data called Digital Identity (ID), which they must use for authentication purposes. Within the e-world it is certainly risky to lose the identity and this security threat must be ranking with the highest priority, forcing a solution that provides an amenable usage of digital identity. Efficient protection of the digital identity would also encourage users to enter the digital world without worries. Security needs to provide the necessary identity management (IDM) process to mitigate that threat. This paper gives an overview of IDM and suggests a framework that can be particularly useful for a secure user authentication. The proposed model appears as a multi-layered security approach, since it tries to integrate different security technologies and multimodal biometrics tools and practices, such as police, procedures, guidelines, standards and legislation. The advantages, limitations and requirements of the proposed model are discussed.

International Journal of Scientific Research in Computer Science, Engineering and Information Technology

International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT

With the occurrence of the World Wide Web and the emergence of ecommerce applications and social networks, organizations across the world generate a large amount of data daily. Information security is the most extreme basic issue in guaranteeing safe transmission of data through the web. Also network security issues are now becoming important as society is moving towards digital information age. As more and more users connect to the internet it attracts a lot of cyber-attacks. It required to protect computer and network security i.e. the critical issues. The pernicious hubs make an issue in the system. It can utilize the assets of different hubs and safe guard the assets of its own. In this paper we provide an overview on Network Security and various techniques through which Network Security can be enhanced i.e. Cryptography. Cryptography and Network Security is used to protect network and data transmission takes place over wireless network.

Richard Paige

Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users are not cryptography experts. A number of empirical studies have demonstrated that explicit, user-visible cryptographic mechanisms are not widely used by non-expert users, and as a result arguments have been made that cryptographic mechanisms need to be better hidden or embedded in end-user processes and tools. Other mechanisms, such as HTTPS, have cryptography built-in and only become visible to the user when a dialogue appears due to a (potential) problem. This paper surveys deployed and potential technologies in use, examines the social and legal context of broad classes of users, and from there, assesses the value and issues for those users.

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

Mahmoud Maqableh

Prof. Dr. SOLTANE MOHAMED , Ph.D & HDR

muhammed isah yakubu

International Journal of Engineering Research and Technology (IJERT)

IJERT Journal

Golden Meteorite Press

Austin A Mardon , Ishpreet Chana , Alexia Di Martino , Jennifer Pham , Noah Varghese

JASH MATHEW

IOSR Journals publish within 3 days

Shyan-ming Yuan

Mrityunjay Ghosh

James Starrs

Duncan Spiers

Ahmad Alsadeh

International Journal of Computer Applications

Mridula Purohit

Etuh Emmanuel , Esther Dada

Covenant Journal of Informatics and Communication Technology

E. Okediran

Leandro Tortosa , José Vicent , Jose F. Vicent

Rafael Sanchez

Behrouz Zolfaghari

umme habiba

JMSS, A2Z Journals

Journal of Management and Service Science (JMSS), A 2 Z Journals

IJAR Indexing

Rahul Kumar Yadav

Biometric-Based Physical and Cybersecurity Systems

waleed hassan

Ulf Mattsson

Pedro G M R Alves

Book Chapter in the book entitled: Theory and Practice of Cryptography and Network Security Protocols and Technologies, ISBN: 980-953-307-848-4, Sen, J. (Ed.), published by INTECH Publishers, Croatia, in July 2013, pp. 1- 31.

Hamza Aldabbas

Ivan Visconti

Future Internet

Klaus-Peter Fischer-Hellmann

khoi nguyen

John K. Alhassan

International Journal of Computer …

Bernd Meyer

Dr.Johon Dsan

Rashid Khan

International Journal of Engineering Sciences & Research Technology

Ijesrt Journal

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

A Review on Security Vulnerabilities in Cloud Computing

  • Conference paper
  • First Online: 31 August 2024
  • Cite this conference paper

literature review of network security

  • Juvi Bharti 39 &
  • Sarpreet Singh 39  

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1189))

Included in the following conference series:

  • International Conference on Data, Engineering and Applications

Cloud computing is a shared pool of programmable computer system resources and higher-level services that can be instantly delivered through the Internet with minimum administrative work. It offers huge benefits, but it poses numerous security dangers. Before migrating their computing, storage, and applications to the cloud, customers must comprehend upcoming dangers and weaknesses, as well as consider potential responses. Due to the escalating dangers in the cloud environment, the identification of its weaknesses and the most effective instructions for enhancing security have become crucial for all activities conducted there. In this document, for each risk, there is a list of possible countermeasures that are already in place.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Grover J, Sharma M et al (2014) Cloud computing and its security issues—A reviews. In: IEEE 5th ICCCNT

Google Scholar  

Zhang Q, Cheng L et al (2010) Cloud computing: state of the art and research challenges. Int J Internet Serv Appl 1(1):7–18

Article   Google Scholar  

Cafaro M, Aloisio G (2010) Grids, clouds and virtualization. Springer, p 7. ISBN 978-1-4471-2592-1

Ma X (2012) Security concerns in cloud computing. In: 4th international conference on computational and information science

Rittinghouse J, Ransom J (2010) Cloud computing: implementation, management and security. CRC Press, Taylor & Francis Group, Boca Raton

Bernsmed et al (2012) Thunder in the clouds: security challenges and solutions for federated clouds. In: 4th IEEE international conference on cloud computing technology and science proceedings

Metheny M (2012) Federal cloud computing : the definitive guide for cloud service providers. Elsevier Science

Chou T-S (2013) Security threats on cloud computing vulnerabilities. Int J Comput Sci Inf Technol 5(3):79–88

Takabi H, Joshi JBD, Ahn G (2010) Security and privacy challenges in cloud computing environments, security & privacy. IEEE 8(6):24–31

Chakraborty R, Ramireddy S, Raghu TS, Rao HR (2010) The information assurance practices of cloud computing vendors. IT Professional 12:29–37

Musa FA, Sani SM (2014) Security threats and countermeasures in cloud computing. Int Res J Electron Comput Eng

Sen J (2018) Security and privacy issues cloud computing. https://pdfs.semanticscholar.org/4dc3/70d253020947a8e66b701e12dd0233161229.pdf . Accessed 11 April 2018

R. Security and privacy in cloud computing. Spring, April 2017

Khormali A, Mohaisen A, Saad M (2018) End-to-End analysis of in-browser cryptojacking

Alhaidary M, Rahman SMM, Gupta BB et al (2018) Vulnerability analysis for the authentication protocols in trusted computing platforms and proposed enhancement of the Off-PAD protocol. IEEE Access 6:6071–6081

Yesilyurt M, Yalman Y (2016) New approach for ensuring cloud computing security: using data hiding methods. Sadhana 41(11):1289–1298

Khalil IM, Khreishah A, Azeem M (2014) Cloud computing security: a survey. Computers 1–35

Ashraf M, Kamel F (2015) Vendor lock-in in the transition to a cloud computing platform. In: Degree project in communication systems second level Stockholm, Sweden, pp 1–42

Dhote C, Potey MM et al (2013) Cloud computing—Understanding risk, threats, vulnerability and controls: a survey. Int J Comput Appl 67:9–14

Jamil D, Zaki H (2011) Security issues in cloud computing and countermeasures. Int J Eng Sci Technol 3(4):2672–2676

Barakat OL et al (2013) Malware analysis performance enhancement using cloud computing,. J Comput Virol Hacking Tech 10(1):1–10

Singh S, Jeong Y-S, Park JH (2016) A survey on cloud computing security: issues, threats, and 86 solutions. J Netw Comput Appl 75:200–222

Rocha F, Abreu S, Correia M (2011) The final frontier: confidentiality and privacy in the cloud. IEEE Comput 44(9):44–50

Pearson S, Yee G (2013) Privacy and security for cloud computing. Springer

Morabito V (2014) Big data in trends and challenges in digital business innovation. Springer Intl. Publishing, pp 3–21

Duncan AJ, Creese S, Goldsmith M (2012) Insider attacks in cloud computing. In: 11th IEEE international conference on trust, security and privacy in computing and communications, TrustCom, pp 857–862

Thampi SM, Zomaya AY, Strufe T, AlcarazCalero JM, Thomas T (2012) Recent trends in computer networks and distributed systems security. In: International conference on security in computer networks and distributed systems, vol 335, Springer

Das SK, Kant K, Zhang N (2012) Handbook on securing cyber-physical critical infrastructure. Morgan Kaufmann

Buyya R, Vecchiola C, Selvi ST (2013) Mastering cloud computing : foundations and applications programming. Morgan Kaufmann

Tang Y, Lee PPC, Lui JCS, Perlman R (2012) Secure overlay cloud storage with access control and assured deletion. IEEE Trans Depend Secur Comput 9(6):903–916

Seddon JJM, Currie WL (2013) Cloud computing and trans-border health data: Unpacking U.S. 95 and EU healthcare regulation and compliance. Health Policy Technol 2(4):pp 229–241

Bansal P, Siddharth S, Agarwal A (2016) Evolution of cloud computing and related security concerns

Alouane M, El Bakkali H (2015) Security, privacy and trust in cloud computing: a comparative study. In: International conference on cloud technologies and applications (CloudTech), pp 1–8

Alani MM (2014) Securing the cloud: threats, attacks and mitigation techniques. J Adv Comput Sci Technol 3(2):202–213

Ardagna CA (2015) From security to assurance in the cloud: a survey 48(50)

Srinivasan S (2014) Security, trust, and regulatory aspects of cloud computing in business environments. IGI-Global

Harfoushi O, Alfawwaz B, Ghatasheh NA, Obiedat R, Abu-Faraj MM, Faris H (2014) Data security issues and challenges in cloud computing: a conceptual analysis and review. Commun Netw 6(1):15–21

Barona R, Anita EAM (2017) A survey on data breach challenges in cloud computing security: Issues and threats. In: International conference on circuit, power and computing technologies

Alhenaki L (2019) A survey on the security of cloud computing. Institute of Electrical and Electronics Engineers

Stallings W (2013) Network security essential: applications and standards. Pearson Education India

Saranya K, Mohanapriya R et al (2014) a review on symmetric key encryption techniques in cryptography. Int J Sci Eng Technol 3(3):539–544

Lal NA, Prasad S, Farik M (2016) A review of authentication methods. Int J Sci Technol Res 5(11)

Chandrasekhar AM, Sahana K, Yashaswini K (2016) Securing cloud environment using firewall and VPN. Int J Adv Res Comput Sci Softw Eng Res 6(1):151–156

Mohammed I, Saleh A, Hamdan HM (2018) On studying the antivirus behavior on Kernel activitie. In: Proceedings of the international conference on frontiers of information technology, April 2018, pp 1–6

Prajapati GI, Surati SB (2017) A review on Ransom ware detection & prevention. Int J Res Sci Innov 4(9):86–91

Anjana, Singh A (2018) Security concerns and countermeasures in cloud computing: a qualitative analysis. Int J Inf Technol

Grabhall K, Jadyal N et al (2016) Data portioning technique to improve cloud data storage security. Int J Adv Res Comput Commun Eng 5

Parisha, Khanna P et al (2017) Hash function based data portioning in cloud computing for secured cloud storage. Int J Eng Res Appl 7(7):1–6

Ouedrogo et al (2015) Security transparency: the next frontier for security research in the cloud. J Cloud Comput: Adv Syst Appl 4(12)

Hashizume et al (2013) An analysis of security issues for cloud computing. J Internet Serv Appl 4(5)

Noura NH, Chenab A et al (2021) Robotics cyber security: vulnerabilities, attacks, countermeasures and recommendations. Int J Inf Secur 115–158

Masud M, Najmi YK et al (2021) A survey on security threats and countermeasures in IoT to achive users confidentiality and realibility

Humayun M, Niazi NZ et al (2020) Cyber security threats and vulnerabilities: a systematic mapping study. Arab J Sci Eng

Janrga A, Singh N (2017) Challenges and prosperity research in cloud computing. Int J Comput Trends Technol 49:200–205

Axon (2018) An introductory paper to the main issues and potential areas for government action Cloud Computing for the Public Sector and its Policy Implications. April

Dar AR, Ravindran D (2018) A comprehensive study on cloud computing paradigm. Int J Adv Res Sci Eng 7(4):235–242

Download references

Author information

Authors and affiliations.

Department of Computer Science, Sri Guru Granth Sahib World University, Punjab, India

Juvi Bharti & Sarpreet Singh

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Sarpreet Singh .

Editor information

Editors and affiliations.

Rajiv Gandhi Technical University, Bhopal, Madhya Pradesh, India

Jitendra Agrawal

Oriental Institute of Science and Technology, Bhopal, Madhya Pradesh, India

Rajesh K. Shukla

Sanjeev Sharma

National Kaohsiung University of Science and Technology, Kaohsiung, Taiwan

Chin-Shiuh Shieh

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper.

Bharti, J., Singh, S. (2024). A Review on Security Vulnerabilities in Cloud Computing. In: Agrawal, J., Shukla, R.K., Sharma, S., Shieh, CS. (eds) Data Engineering and Applications. IDEA 2022. Lecture Notes in Electrical Engineering, vol 1189. Springer, Singapore. https://doi.org/10.1007/978-981-97-2451-2_16

Download citation

DOI : https://doi.org/10.1007/978-981-97-2451-2_16

Published : 31 August 2024

Publisher Name : Springer, Singapore

Print ISBN : 978-981-97-2450-5

Online ISBN : 978-981-97-2451-2

eBook Packages : Intelligent Technologies and Robotics Intelligent Technologies and Robotics (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

IMAGES

  1. (PDF) Systematic Literature Review on Security Risks and its Practices

    literature review of network security

  2. (PDF) Network Security

    literature review of network security

  3. (PDF) A systematic literature review of security software defined

    literature review of network security

  4. (PDF) A LITERATURE REVIEW ON SECURITY ISSUES IN CLOUD COMPUTING

    literature review of network security

  5. (PDF) A Literature Review on Machine Learning for Cyber Security Issues

    literature review of network security

  6. (PDF) A Systematic Literature Review on 5G Security

    literature review of network security

VIDEO

  1. Network Detection And Response

  2. Network Settings Reset Kaise Kare ? Mobile Network Ko Reset Kaise Kare

  3. When to Decline a Networking Request

  4. “People are shocked & appalled by what the US government is doing."

  5. Innovations in Network Security Policy

  6. Introduction to Network Security

COMMENTS

  1. (Pdf) Literature Review and Comprehensive Evaluation Security and

    This literature review offers a thorough examination of recent developments in wireless network security and privacy, emphasizing the evolving landscape, including challenges, solutions, and ...

  2. A systematic literature review of methods and datasets for anomaly

    Section 2 summarizes existing literature review work related to intrusion detection systems and datasets, ... The survey covered 119 of the most highly cited papers in the field of network security intrusion detection, including preprocessing and intrusion detection techniques, and analyzed the community from multiple perspectives. ...

  3. Full article: Network security

    Abstract. Network security is a specialized field consisting of the provisions and policies to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources as well as ensuring their availability through proper procedures. Many security devices are being developed and deployed to ...

  4. (PDF) A Systematic Literature Review on the Cyber Security

    Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data. The primary goal of this ...

  5. A Systematic Literature Review on Penetration Testing in Networks

    Given the widespread use of the internet at the individual, governmental, and nongovernmental levels, and the opportunities it offers, such as online shopping, security concerns may arise. Cyber criminals are responsible for stopping organizations' access to internet, for stealing valuable and confidential data, and causing other damage. Therefore, the network must be protected and meet ...

  6. A systematic literature review for network intrusion detection system

    With the recent increase in internet usage, the number of important, sensitive, confidential individual and corporate data passing through internet has increasingly grown. With gaps in the security systems, attackers have attempted to intrude the network, thereby gaining access to essential and confidential information, which may cause harm to the operation of the systems, and also affect the ...

  7. JSAN

    Security-by-design is a way to build a network where security is considered holistically in the whole network from its first concept, through the design, development, installation, configuration and maintenance of the network and to the finalisation of the useful life of the network. ... Alzahrani, R.A.; Aljabri, M. AI-Based Techniques for Ad ...

  8. Exploring the landscape of network security: a comparative ...

    The field of computer networking is experiencing rapid growth, accompanied by the swift advancement of internet tools. As a result, people are becoming more aware of the importance of network security. One of the primary concerns in ensuring security is the authority over domains, and network owners are striving to establish a common language to exchange security information and respond ...

  9. Literature review on network security in Wireless Mobile Ad-hoc Network

    It is essential to shelter the network from attacks over the Internet by keeping the secure router.,This paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT ...

  10. 349293 PDFs

    Find methods information, sources, references or conduct a literature review on NETWORK SECURITY. Science topics: Computer Science and Engineering Computer Communications ...

  11. 1 A Systematic Literature Review on 5G Security

    s. The review mainly focused on cyber security. Due to the evolution of the 5G network's landscape, it has become more common for. security threats to appear at different levels. Through a systematic literature review, the authors of this review were able to provide a comprehensive under-standing of the num.

  12. A Systematic Literature Review of Intrusion Detection System for

    Study on intrusion detection system (IDS) mostly allow network administrators to focus on development activities in terms of network security and making better use of resource. Many IDS datasets, techniques and methods conducted by some administrator to get a good performance of IDS. But, some methods, techniques and datasets published differently show that research in the field of intrusion ...

  13. Wireless sensor network security: A recent review based on state-of-the

    Wireless sensor network security is provided on two levels. 16 On the first level, encryption methods and firewalls are utilised to protect the network from outside attackers. Intrusion detection systems (IDS) are employed to defend against internal intruders at the second level. ... We identified several issues and challenges in the literature ...

  14. Literature Review of Security in Smart Home Network

    This chapter will review existing research works related to the security and privacy challenges in the smart home network. The structure of this chapter is organized into three levels: "terminal device—user interface—smart application.". Section 2.1 will review the side-channel privacy risks faced by the terminal equipment, including ...

  15. Artificial intelligence for cybersecurity: Literature review and future

    We performed a systematic literature review (SLR) on the use of AI for the provision of cybersecurity, ... device authentication is the process of authenticating devices based on their credentials or behaviour in the network to ensure the security of machine-to-machine communication. Researchers are actively working in the field of sensor ...

  16. [2212.03299] A Systematic Literature Review on 5G Security

    A Systematic Literature Review on 5G Security. It is expected that the creation of next-generation wireless networks would result in the availability of high-speed and low-latency connectivity for every part of our life. As a result, it is important that the network is secure. The network's security environment has grown more complicated as a ...

  17. (PDF) A Review on Network Security

    Computer Science and Software Engineering. ISSN: 2277-128X (Volume-8, Issue-5) A Review on Network Security. Rahul Jain. Scholar, Department of Computer Science & E ngineering, ABESIT, Ghaziabad ...

  18. A systematic literature review of security software defined network

    In this study, a survey was conducted to find out the development trend in SDN security and security architecture of SDN using systematic literature review (SLR) method, and SLR result stated that research in architecture of network security is still very relevant to be done.

  19. A Systematic Literature Review on the Cyber Security

    A Systematic Literature Review on the Cyber Security 1Dr.Yusuf Perwej, 2Prof. (Dr.) Syed Qamar Abbas, 3Jai Pratap Dixit, 4Dr. Nikhat ... Cyber Crime, Network Security, Internet of Things (IoT) Security, Cyber Security Frameworks, Malware. I. Introduction The Internet is one of the most important inventions of the twenty-first century that has ...

  20. Network intrusion detection system: A systematic study of machine

    A systematic literature review is a methodology followed to identify, ... It is obvious that for efficient network security, the IDS demands a higher Accuracy and Detection rate. So, to investigate the efficiency and effectiveness of the proposed methodology, these two performance metrics should be considered. For a typical IDS designed using ...

  21. System security assurance: A systematic literature review

    Therefore, a detailed and systematic literature review on "System Security Assurance" has been conducted in this paper. The motive of this paper is to study state-of-the-art, research trends, limitations, and future research directions in security assurance of the ICT and CPSs in a wide range of domains.

  22. Literature Review on Cryptography and Network Security

    This literature review looks at the research that has been published in the area of cryptography as it relates to network data and global communications security. It compares and contrasts the research pointing out overall trends in what has already been published on this subject. It analyzes the role that cryptography has played and will play ...

  23. A systematic literature review of cyber-security data ...

    In Machine Learning, the datasets used to build models are one of the main factors limiting what these models can achieve and how good their predictive performance is. Machine Learning applications for cyber-security or computer security are numerous including cyber threat mitigation and security infrastructure enhancement through pattern recognition, real-time attack detection, and in-depth ...

  24. A Review on Security Vulnerabilities in Cloud Computing

    3 Literature Review. 3.1 Vulnerabilities to Cloud Computing. See Fig. 1. Fig. 1. Security vulnerabilities in cloud computing . ... A firewall is crucial to network security as it filters each incoming packet and sits between an internal network and the outside world. A combination of a firewall and a VPN allows for more precise server access ...