Information
- Author Services
Initiatives
You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.
All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .
Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.
Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.
Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.
Original Submission Date Received: .
- Active Journals
- Find a Journal
- Proceedings Series
- For Authors
- For Reviewers
- For Editors
- For Librarians
- For Publishers
- For Societies
- For Conference Organizers
- Open Access Policy
- Institutional Open Access Program
- Special Issues Guidelines
- Editorial Process
- Research and Publication Ethics
- Article Processing Charges
- Testimonials
- Preprints.org
- SciProfiles
- Encyclopedia
Article Menu
- Subscribe SciFeed
- Google Scholar
- on Google Scholar
- Table of Contents
Find support for a specific problem in the support section of our website.
Please let us know what you think of our products and services.
Visit our dedicated information section to learn more about MDPI.
JSmol Viewer
Featured papers on network security and privacy.
1. Introduction
2. an overview of published articles, 3. conclusions, conflicts of interest.
- Antony, S.N.F.M.A.; Bahari, M.F.A. Implementation of Elliptic Curves in the Polynomial Blom Key Pre-Distribution Scheme for Wireless Sensor Networks and Distributed Ledger Technology. J. Sens. Actuator Netw. 2023 , 12 , 15. [ Google Scholar ] [ CrossRef ]
- Aljabri, M.; Alahmadi, A.A.; Mohammad, R.M.A.; Alhaidari, F.; Aboulnour, M.; Alomari, D.M.; Mirza, S. Machine Learning-Based Detection for Unauthorized Access to IoT Devices. J. Sens. Actuator Netw. 2023 , 12 , 27. [ Google Scholar ] [ CrossRef ]
- Almuhaideb, A.M.; Aslam, N.; Alabdullatif, A.; Altamimi, S.; Alothman, S.; Alhussain, A.; Aldosari, W.; Alsunaidi, S.J.; Alissa, K.A. Homoglyph Attack Detection Model Using Machine Learning and Hash Function. J. Sens. Actuator Netw. 2022 , 11 , 54. [ Google Scholar ] [ CrossRef ]
- Almuhaideb, A.M.; Algothami, S.S. Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV. J. Sens. Actuator Netw. 2022 , 11 , 28. [ Google Scholar ] [ CrossRef ]
- Mannix, K.; Gorey, A.; O’Shea, D.; Newe, T. Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them. J. Sens. Actuator Netw. 2022 , 11 , 43. [ Google Scholar ] [ CrossRef ]
- Alzahrani, R.A.; Aljabri, M. AI-Based Techniques for Ad Click Fraud Detection and Prevention: Review and Research Directions. J. Sens. Actuator Netw. 2023 , 12 , 4. [ Google Scholar ] [ CrossRef ]
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
Share and Cite
Mongay Batalla, J. Featured Papers on Network Security and Privacy. J. Sens. Actuator Netw. 2024 , 13 , 11. https://doi.org/10.3390/jsan13010011
Mongay Batalla J. Featured Papers on Network Security and Privacy. Journal of Sensor and Actuator Networks . 2024; 13(1):11. https://doi.org/10.3390/jsan13010011
Mongay Batalla, Jordi. 2024. "Featured Papers on Network Security and Privacy" Journal of Sensor and Actuator Networks 13, no. 1: 11. https://doi.org/10.3390/jsan13010011
Article Metrics
Article access statistics, further information, mdpi initiatives, follow mdpi.
Subscribe to receive issue release notifications and newsletters from MDPI journals
To read this content please select one of the options below:
Please note you do not have access to teaching notes, literature review on network security in wireless mobile ad-hoc network for iot applications: network attacks and detection mechanisms.
International Journal of Intelligent Unmanned Systems
ISSN : 2049-6427
Article publication date: 21 September 2021
Issue publication date: 22 November 2022
Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine with the IoT via the sensing capability of Internet-connected devices and the Internet access ability of sensor nodes. It is essential to shelter the network from attacks over the Internet by keeping the secure router.
Design/methodology/approach
This paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT) applications. The literature review is focused on various types of attacks concentrated in each contribution and the adoption of prevention and mitigation models are observed. In addition, the types of the dataset used, types of attacks concentrated, types of tools used for implementation, and performance measures analyzed in each contribution are analyzed. Finally, an attempt is made to conclude the review with several future research directions in designing and implementing IDS for MANETs that preserve the security aspects of IoT.
It observed the different attack types focused on every contribution and the adoption of prevention and mitigation models. Additionally, the used dataset types, the focused attack types, the tool types used for implementation, and the performance measures were investigated in every contribution.
Originality/value
This paper presents a literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications.
- Network security
- Wireless sensor network
- Mobile ad-hoc network
- IoT applications
- Network attacks
- Intrusion detection system
Acknowledgements
The author would like to thank R. Narmadha for her support and constructive suggestions during the planning and development of this research work and would like to express appreciation for her willingness to give her valuable time. Also the author wishes to thank the author’s family for their support and encouragement throughout this work.
Funding : None.
Pamarthi, S. and Narmadha, R. (2022), "Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms", International Journal of Intelligent Unmanned Systems , Vol. 10 No. 4, pp. 482-506. https://doi.org/10.1108/IJIUS-05-2021-0028
Emerald Publishing Limited
Copyright © 2021, Emerald Publishing Limited
Related articles
All feedback is valuable.
Please share your general feedback
Report an issue or find answers to frequently asked questions
Contact Customer Support
IEEE Account
- Change Username/Password
- Update Address
Purchase Details
- Payment Options
- Order History
- View Purchased Documents
Profile Information
- Communications Preferences
- Profession and Education
- Technical Interests
- US & Canada: +1 800 678 4333
- Worldwide: +1 732 981 0060
- Contact & Support
- About IEEE Xplore
- Accessibility
- Terms of Use
- Nondiscrimination Policy
- Privacy & Opting Out of Cookies
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
This week: the arXiv Accessibility Forum
Help | Advanced Search
Computer Science > Cryptography and Security
Title: a systematic literature review on 5g security.
Abstract: It is expected that the creation of next-generation wireless networks would result in the availability of high-speed and low-latency connectivity for every part of our life. As a result, it is important that the network is secure. The network's security environment has grown more complicated as a result of the growing number of devices and the diversity of services that 5G will provide. This is why it is important that the development of effective security solutions is carried out early. Our findings of this review have revealed the various directions that will be pursued in the development of next-generation wireless networks. Some of these include the use of Artificial Intelligence and Software Defined Mobile Networks. The threat environment for 5G networks, security weaknesses in the new technology paradigms that 5G will embrace, and provided solutions presented in the key studies in the field of 5G cyber security are all described in this systematic literature review for prospective researchers. Future research directions to protect wireless networks beyond 5G are also covered.
Subjects: | Cryptography and Security (cs.CR) |
Cite as: | [cs.CR] |
(or [cs.CR] for this version) | |
Focus to learn more arXiv-issued DOI via DataCite |
Submission history
Access paper:.
- Other Formats
References & Citations
- Google Scholar
- Semantic Scholar
BibTeX formatted citation
Bibliographic and Citation Tools
Code, data and media associated with this article, recommenders and search tools.
- Institution
arXivLabs: experimental projects with community collaborators
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.
Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .
A Review on Network Security
- This person is not on ResearchGate, or hasn't claimed this research yet.
- ABES Institute of Technology
Abstract and Figures
Discover the world's research
- 25+ million members
- 160+ million publication pages
- 2.3+ billion citations
- Kurdistan Regional Government
- Hazha Khatab Rasul
- Erbil - Kurdistan
- ABDELOUAHED BAMOU
- Recruit researchers
- Join for free
- Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up
A systematic literature review of security software defined network: research trends, threat, attack, detect, mitigate, and countermeasure
New citation alert added.
This alert has been successfully added and will be sent to:
You will be notified whenever a record that you have chosen has been cited.
To manage your alert preferences, click on the button below.
New Citation Alert!
Please log in to your account
Information & Contributors
Bibliometrics & citations.
- Kurniawan M Fathinuddin M Widiyanti H Simanjuntak G (2021) Network Slicing on SDN using FlowVisor and POX Controller to Traffic Isolation Enforcement 2021 International Conference on Engineering and Emerging Technologies (ICEET) 10.1109/ICEET53442.2021.9659765 (1-6) Online publication date: 27-Oct-2021 https://doi.org/10.1109/ICEET53442.2021.9659765
- Yurekten O Demirci M (2021) SDN-based cyber defense Future Generation Computer Systems 10.1016/j.future.2020.09.006 115 :C (126-149) Online publication date: 1-Feb-2021 https://dl.acm.org/doi/10.1016/j.future.2020.09.006
Index Terms
Security and privacy
Network security
Recommendations
Systematic literature review on usability of firewall configuration.
Firewalls are network security components that handle incoming and outgoing network traffic based on a set of rules. The process of correctly configuring a firewall is complicated and prone to error, and it worsens as the network complexity grows. A ...
Towards a systematic survey of industrial IoT security requirements: research method and quantitative analysis
Industry 4.0 and, in particular, Industrial Internet of Things (IIoT) represent two of the major automation and data exchange trends of the 21 st century, driving a steady increase in the number of smart embedded devices used by industrial applications. ...
A Systematic Security Assessment and Review of Internet of Things in the Context of Authentication
The Internet of Things is emerging globally as an intriguing trend expected to connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation to various application domains provides a plethora of ...
Information
Published in.
- Conference Chairs:
Tokyo University of Science, Japan
Shanghai Jiao Tong University, China
Association for Computing Machinery
New York, NY, United States
Publication History
Permissions, check for updates, author tags.
- software defined network
- systematic literature review
- Research-article
Contributors
Other metrics, bibliometrics, article metrics.
- 2 Total Citations View Citations
- 465 Total Downloads
- Downloads (Last 12 months) 33
- Downloads (Last 6 weeks) 1
View Options
Login options.
Check if you have access through your login credentials or your institution to get full access on this article.
Full Access
View options.
View or Download as a PDF file.
View online with eReader .
Share this Publication link
Copying failed.
Share on social media
Affiliations, export citations.
- Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
- Download citation
- Copy citation
We are preparing your search results for download ...
We will inform you here when the file is ready.
Your file of search results citations is now ready.
Your search export query has expired. Please try again.
Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser .
Enter the email address you signed up with and we'll email you a reset link.
- We're Hiring!
- Help Center
Literature Review on Cryptography and Network Security
This literature review looks at the research that has been published in the area of cryptography as it relates to network data and global communications security. It compares and contrasts the research pointing out overall trends in what has already been published on this subject. It analyzes the role that cryptography has played and will play in the future relative to security. This review addresses cryptography around the central theme of the security that it provides or should provide individuals, corporations, and others in the modern age of computing technology, networking, and Web-based ecommerce. By reviewing both scholarly and non-scholarly works, it is our objective to make a case that continuing research into the use of cryptography is paramount in preserving the future of electronic data security and privacy as well as the continuing development of Web-based applications that will permit the growth of ecommerce business worldwide to be conducted over the Internet.
Related Papers
Mahamaya Technical University
Ajay Bhushan
The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems. This work specifies the functionality of TORDES fro encryption and decryption to protect the sensitive unclassified data. TORDES is made available within the context of a total security program consisting of physical security procedure. In the absence of generally acknowledged metrics in the public area that could be used to compute and spell out cryptographic strength, a small operational group agreed to look at the possibility of developing an approach to cryptographic metrics The purpose of this dissertation is to report the results of the limited exploratory effort by the above operational group that investigated the practicality of developing metrics for use in specifying the strength of cryptographic algorithms. This work is only deals with a small sample of selected symmetric cipher block encryption algorithms. The selective application of technological and related procedural safeguard is an important responsibility of every cryptographic algorithm in providing adequate security to its electronic data systems. This work specifies TORDES including its primary component, cryptographic engines, MODDES, DES, TDES, AES to compare in terms of memory required and encryption, decryption time. In today's epoch, most of the means of secure data and code storage and distribution rely on using cryptographic Schemes, such as certificates or encryption keys. This dissertation is devoted to the security and attack aspects of cryptographic techniques with new symmetric key algorithm TORDES. This algorithm is proposed to achieve the different goals of security i.e., Availability, Confidentiality and Integrity. We will also discuss the security threats in this algorithm. Security is a very complex and vast topic. There is such a tool available in market which easily crack the conventional cryptographic data. It is necessary to design such a Algorithm which approach a different from these algorithms. TORDES is the one of best direction in this approach. The proposed system is successfully tested on text. The performance and security provided by proposed system is better than other secret key algorithm for the message of fixed size. The main advantage of proposed system is that it is not fully dependent on the key and for the same plain text it produces different modified secure codes
maurice kabeireho
Journal of Computer Security
Anna Squicciarini
John Gerdes
5G communication technology works with the integration of several technologies viz. Cloud Computing, network partitioning and software based networks. This integration allows the communication between thousands of device across the world which have enormous issues related to data protection, data authenticity, and data confidentiality. So, there is an immense need of secure protocols to face or resolve security related issues related to design and operation of 5G network. Moreover, some structured cryptography protocols required to develop and accomplish data security in 5G communication. The study focussing on the comprehensive consequences of quantum computing on security implementations of 5G mobile communications. The study discussing about the cryptographic algorithm used in 5G, and what are the various consequences of involvement of quantum computing.
Abdullah Rashed , Henrique Santos
In the Electronic Society (e-world) users are represented by a set of data called Digital Identity (ID), which they must use for authentication purposes. Within the e-world it is certainly risky to lose the identity and this security threat must be ranking with the highest priority, forcing a solution that provides an amenable usage of digital identity. Efficient protection of the digital identity would also encourage users to enter the digital world without worries. Security needs to provide the necessary identity management (IDM) process to mitigate that threat. This paper gives an overview of IDM and suggests a framework that can be particularly useful for a secure user authentication. The proposed model appears as a multi-layered security approach, since it tries to integrate different security technologies and multimodal biometrics tools and practices, such as police, procedures, guidelines, standards and legislation. The advantages, limitations and requirements of the proposed model are discussed.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT
With the occurrence of the World Wide Web and the emergence of ecommerce applications and social networks, organizations across the world generate a large amount of data daily. Information security is the most extreme basic issue in guaranteeing safe transmission of data through the web. Also network security issues are now becoming important as society is moving towards digital information age. As more and more users connect to the internet it attracts a lot of cyber-attacks. It required to protect computer and network security i.e. the critical issues. The pernicious hubs make an issue in the system. It can utilize the assets of different hubs and safe guard the assets of its own. In this paper we provide an overview on Network Security and various techniques through which Network Security can be enhanced i.e. Cryptography. Cryptography and Network Security is used to protect network and data transmission takes place over wireless network.
Richard Paige
Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users are not cryptography experts. A number of empirical studies have demonstrated that explicit, user-visible cryptographic mechanisms are not widely used by non-expert users, and as a result arguments have been made that cryptographic mechanisms need to be better hidden or embedded in end-user processes and tools. Other mechanisms, such as HTTPS, have cryptography built-in and only become visible to the user when a dialogue appears due to a (potential) problem. This paper surveys deployed and potential technologies in use, examines the social and legal context of broad classes of users, and from there, assesses the value and issues for those users.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
RELATED PAPERS
Mahmoud Maqableh
Prof. Dr. SOLTANE MOHAMED , Ph.D & HDR
muhammed isah yakubu
International Journal of Engineering Research and Technology (IJERT)
IJERT Journal
Golden Meteorite Press
Austin A Mardon , Ishpreet Chana , Alexia Di Martino , Jennifer Pham , Noah Varghese
JASH MATHEW
IOSR Journals publish within 3 days
Shyan-ming Yuan
Mrityunjay Ghosh
James Starrs
Duncan Spiers
Ahmad Alsadeh
International Journal of Computer Applications
Mridula Purohit
Etuh Emmanuel , Esther Dada
Covenant Journal of Informatics and Communication Technology
E. Okediran
Leandro Tortosa , José Vicent , Jose F. Vicent
Rafael Sanchez
Behrouz Zolfaghari
umme habiba
JMSS, A2Z Journals
Journal of Management and Service Science (JMSS), A 2 Z Journals
IJAR Indexing
Rahul Kumar Yadav
Biometric-Based Physical and Cybersecurity Systems
waleed hassan
Ulf Mattsson
Pedro G M R Alves
Book Chapter in the book entitled: Theory and Practice of Cryptography and Network Security Protocols and Technologies, ISBN: 980-953-307-848-4, Sen, J. (Ed.), published by INTECH Publishers, Croatia, in July 2013, pp. 1- 31.
Hamza Aldabbas
Ivan Visconti
Future Internet
Klaus-Peter Fischer-Hellmann
khoi nguyen
John K. Alhassan
International Journal of Computer …
Bernd Meyer
Dr.Johon Dsan
Rashid Khan
International Journal of Engineering Sciences & Research Technology
Ijesrt Journal
RELATED TOPICS
- We're Hiring!
- Help Center
- Find new research papers in:
- Health Sciences
- Earth Sciences
- Cognitive Science
- Mathematics
- Computer Science
- Academia ©2024
A Review on Security Vulnerabilities in Cloud Computing
- Conference paper
- First Online: 31 August 2024
- Cite this conference paper
- Juvi Bharti 39 &
- Sarpreet Singh 39
Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1189))
Included in the following conference series:
- International Conference on Data, Engineering and Applications
Cloud computing is a shared pool of programmable computer system resources and higher-level services that can be instantly delivered through the Internet with minimum administrative work. It offers huge benefits, but it poses numerous security dangers. Before migrating their computing, storage, and applications to the cloud, customers must comprehend upcoming dangers and weaknesses, as well as consider potential responses. Due to the escalating dangers in the cloud environment, the identification of its weaknesses and the most effective instructions for enhancing security have become crucial for all activities conducted there. In this document, for each risk, there is a list of possible countermeasures that are already in place.
This is a preview of subscription content, log in via an institution to check access.
Access this chapter
Subscribe and save.
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
- Available as PDF
- Read on any device
- Instant download
- Own it forever
- Available as EPUB and PDF
- Durable hardcover edition
- Dispatched in 3 to 5 business days
- Free shipping worldwide - see info
Tax calculation will be finalised at checkout
Purchases are for personal use only
Institutional subscriptions
Grover J, Sharma M et al (2014) Cloud computing and its security issues—A reviews. In: IEEE 5th ICCCNT
Google Scholar
Zhang Q, Cheng L et al (2010) Cloud computing: state of the art and research challenges. Int J Internet Serv Appl 1(1):7–18
Article Google Scholar
Cafaro M, Aloisio G (2010) Grids, clouds and virtualization. Springer, p 7. ISBN 978-1-4471-2592-1
Ma X (2012) Security concerns in cloud computing. In: 4th international conference on computational and information science
Rittinghouse J, Ransom J (2010) Cloud computing: implementation, management and security. CRC Press, Taylor & Francis Group, Boca Raton
Bernsmed et al (2012) Thunder in the clouds: security challenges and solutions for federated clouds. In: 4th IEEE international conference on cloud computing technology and science proceedings
Metheny M (2012) Federal cloud computing : the definitive guide for cloud service providers. Elsevier Science
Chou T-S (2013) Security threats on cloud computing vulnerabilities. Int J Comput Sci Inf Technol 5(3):79–88
Takabi H, Joshi JBD, Ahn G (2010) Security and privacy challenges in cloud computing environments, security & privacy. IEEE 8(6):24–31
Chakraborty R, Ramireddy S, Raghu TS, Rao HR (2010) The information assurance practices of cloud computing vendors. IT Professional 12:29–37
Musa FA, Sani SM (2014) Security threats and countermeasures in cloud computing. Int Res J Electron Comput Eng
Sen J (2018) Security and privacy issues cloud computing. https://pdfs.semanticscholar.org/4dc3/70d253020947a8e66b701e12dd0233161229.pdf . Accessed 11 April 2018
R. Security and privacy in cloud computing. Spring, April 2017
Khormali A, Mohaisen A, Saad M (2018) End-to-End analysis of in-browser cryptojacking
Alhaidary M, Rahman SMM, Gupta BB et al (2018) Vulnerability analysis for the authentication protocols in trusted computing platforms and proposed enhancement of the Off-PAD protocol. IEEE Access 6:6071–6081
Yesilyurt M, Yalman Y (2016) New approach for ensuring cloud computing security: using data hiding methods. Sadhana 41(11):1289–1298
Khalil IM, Khreishah A, Azeem M (2014) Cloud computing security: a survey. Computers 1–35
Ashraf M, Kamel F (2015) Vendor lock-in in the transition to a cloud computing platform. In: Degree project in communication systems second level Stockholm, Sweden, pp 1–42
Dhote C, Potey MM et al (2013) Cloud computing—Understanding risk, threats, vulnerability and controls: a survey. Int J Comput Appl 67:9–14
Jamil D, Zaki H (2011) Security issues in cloud computing and countermeasures. Int J Eng Sci Technol 3(4):2672–2676
Barakat OL et al (2013) Malware analysis performance enhancement using cloud computing,. J Comput Virol Hacking Tech 10(1):1–10
Singh S, Jeong Y-S, Park JH (2016) A survey on cloud computing security: issues, threats, and 86 solutions. J Netw Comput Appl 75:200–222
Rocha F, Abreu S, Correia M (2011) The final frontier: confidentiality and privacy in the cloud. IEEE Comput 44(9):44–50
Pearson S, Yee G (2013) Privacy and security for cloud computing. Springer
Morabito V (2014) Big data in trends and challenges in digital business innovation. Springer Intl. Publishing, pp 3–21
Duncan AJ, Creese S, Goldsmith M (2012) Insider attacks in cloud computing. In: 11th IEEE international conference on trust, security and privacy in computing and communications, TrustCom, pp 857–862
Thampi SM, Zomaya AY, Strufe T, AlcarazCalero JM, Thomas T (2012) Recent trends in computer networks and distributed systems security. In: International conference on security in computer networks and distributed systems, vol 335, Springer
Das SK, Kant K, Zhang N (2012) Handbook on securing cyber-physical critical infrastructure. Morgan Kaufmann
Buyya R, Vecchiola C, Selvi ST (2013) Mastering cloud computing : foundations and applications programming. Morgan Kaufmann
Tang Y, Lee PPC, Lui JCS, Perlman R (2012) Secure overlay cloud storage with access control and assured deletion. IEEE Trans Depend Secur Comput 9(6):903–916
Seddon JJM, Currie WL (2013) Cloud computing and trans-border health data: Unpacking U.S. 95 and EU healthcare regulation and compliance. Health Policy Technol 2(4):pp 229–241
Bansal P, Siddharth S, Agarwal A (2016) Evolution of cloud computing and related security concerns
Alouane M, El Bakkali H (2015) Security, privacy and trust in cloud computing: a comparative study. In: International conference on cloud technologies and applications (CloudTech), pp 1–8
Alani MM (2014) Securing the cloud: threats, attacks and mitigation techniques. J Adv Comput Sci Technol 3(2):202–213
Ardagna CA (2015) From security to assurance in the cloud: a survey 48(50)
Srinivasan S (2014) Security, trust, and regulatory aspects of cloud computing in business environments. IGI-Global
Harfoushi O, Alfawwaz B, Ghatasheh NA, Obiedat R, Abu-Faraj MM, Faris H (2014) Data security issues and challenges in cloud computing: a conceptual analysis and review. Commun Netw 6(1):15–21
Barona R, Anita EAM (2017) A survey on data breach challenges in cloud computing security: Issues and threats. In: International conference on circuit, power and computing technologies
Alhenaki L (2019) A survey on the security of cloud computing. Institute of Electrical and Electronics Engineers
Stallings W (2013) Network security essential: applications and standards. Pearson Education India
Saranya K, Mohanapriya R et al (2014) a review on symmetric key encryption techniques in cryptography. Int J Sci Eng Technol 3(3):539–544
Lal NA, Prasad S, Farik M (2016) A review of authentication methods. Int J Sci Technol Res 5(11)
Chandrasekhar AM, Sahana K, Yashaswini K (2016) Securing cloud environment using firewall and VPN. Int J Adv Res Comput Sci Softw Eng Res 6(1):151–156
Mohammed I, Saleh A, Hamdan HM (2018) On studying the antivirus behavior on Kernel activitie. In: Proceedings of the international conference on frontiers of information technology, April 2018, pp 1–6
Prajapati GI, Surati SB (2017) A review on Ransom ware detection & prevention. Int J Res Sci Innov 4(9):86–91
Anjana, Singh A (2018) Security concerns and countermeasures in cloud computing: a qualitative analysis. Int J Inf Technol
Grabhall K, Jadyal N et al (2016) Data portioning technique to improve cloud data storage security. Int J Adv Res Comput Commun Eng 5
Parisha, Khanna P et al (2017) Hash function based data portioning in cloud computing for secured cloud storage. Int J Eng Res Appl 7(7):1–6
Ouedrogo et al (2015) Security transparency: the next frontier for security research in the cloud. J Cloud Comput: Adv Syst Appl 4(12)
Hashizume et al (2013) An analysis of security issues for cloud computing. J Internet Serv Appl 4(5)
Noura NH, Chenab A et al (2021) Robotics cyber security: vulnerabilities, attacks, countermeasures and recommendations. Int J Inf Secur 115–158
Masud M, Najmi YK et al (2021) A survey on security threats and countermeasures in IoT to achive users confidentiality and realibility
Humayun M, Niazi NZ et al (2020) Cyber security threats and vulnerabilities: a systematic mapping study. Arab J Sci Eng
Janrga A, Singh N (2017) Challenges and prosperity research in cloud computing. Int J Comput Trends Technol 49:200–205
Axon (2018) An introductory paper to the main issues and potential areas for government action Cloud Computing for the Public Sector and its Policy Implications. April
Dar AR, Ravindran D (2018) A comprehensive study on cloud computing paradigm. Int J Adv Res Sci Eng 7(4):235–242
Download references
Author information
Authors and affiliations.
Department of Computer Science, Sri Guru Granth Sahib World University, Punjab, India
Juvi Bharti & Sarpreet Singh
You can also search for this author in PubMed Google Scholar
Corresponding author
Correspondence to Sarpreet Singh .
Editor information
Editors and affiliations.
Rajiv Gandhi Technical University, Bhopal, Madhya Pradesh, India
Jitendra Agrawal
Oriental Institute of Science and Technology, Bhopal, Madhya Pradesh, India
Rajesh K. Shukla
Sanjeev Sharma
National Kaohsiung University of Science and Technology, Kaohsiung, Taiwan
Chin-Shiuh Shieh
Rights and permissions
Reprints and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper.
Bharti, J., Singh, S. (2024). A Review on Security Vulnerabilities in Cloud Computing. In: Agrawal, J., Shukla, R.K., Sharma, S., Shieh, CS. (eds) Data Engineering and Applications. IDEA 2022. Lecture Notes in Electrical Engineering, vol 1189. Springer, Singapore. https://doi.org/10.1007/978-981-97-2451-2_16
Download citation
DOI : https://doi.org/10.1007/978-981-97-2451-2_16
Published : 31 August 2024
Publisher Name : Springer, Singapore
Print ISBN : 978-981-97-2450-5
Online ISBN : 978-981-97-2451-2
eBook Packages : Intelligent Technologies and Robotics Intelligent Technologies and Robotics (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
- Publish with us
Policies and ethics
- Find a journal
- Track your research
IMAGES
VIDEO
COMMENTS
This literature review offers a thorough examination of recent developments in wireless network security and privacy, emphasizing the evolving landscape, including challenges, solutions, and ...
Section 2 summarizes existing literature review work related to intrusion detection systems and datasets, ... The survey covered 119 of the most highly cited papers in the field of network security intrusion detection, including preprocessing and intrusion detection techniques, and analyzed the community from multiple perspectives. ...
Abstract. Network security is a specialized field consisting of the provisions and policies to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources as well as ensuring their availability through proper procedures. Many security devices are being developed and deployed to ...
Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data. The primary goal of this ...
Given the widespread use of the internet at the individual, governmental, and nongovernmental levels, and the opportunities it offers, such as online shopping, security concerns may arise. Cyber criminals are responsible for stopping organizations' access to internet, for stealing valuable and confidential data, and causing other damage. Therefore, the network must be protected and meet ...
With the recent increase in internet usage, the number of important, sensitive, confidential individual and corporate data passing through internet has increasingly grown. With gaps in the security systems, attackers have attempted to intrude the network, thereby gaining access to essential and confidential information, which may cause harm to the operation of the systems, and also affect the ...
Security-by-design is a way to build a network where security is considered holistically in the whole network from its first concept, through the design, development, installation, configuration and maintenance of the network and to the finalisation of the useful life of the network. ... Alzahrani, R.A.; Aljabri, M. AI-Based Techniques for Ad ...
The field of computer networking is experiencing rapid growth, accompanied by the swift advancement of internet tools. As a result, people are becoming more aware of the importance of network security. One of the primary concerns in ensuring security is the authority over domains, and network owners are striving to establish a common language to exchange security information and respond ...
It is essential to shelter the network from attacks over the Internet by keeping the secure router.,This paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT ...
Find methods information, sources, references or conduct a literature review on NETWORK SECURITY. Science topics: Computer Science and Engineering Computer Communications ...
s. The review mainly focused on cyber security. Due to the evolution of the 5G network's landscape, it has become more common for. security threats to appear at different levels. Through a systematic literature review, the authors of this review were able to provide a comprehensive under-standing of the num.
Study on intrusion detection system (IDS) mostly allow network administrators to focus on development activities in terms of network security and making better use of resource. Many IDS datasets, techniques and methods conducted by some administrator to get a good performance of IDS. But, some methods, techniques and datasets published differently show that research in the field of intrusion ...
Wireless sensor network security is provided on two levels. 16 On the first level, encryption methods and firewalls are utilised to protect the network from outside attackers. Intrusion detection systems (IDS) are employed to defend against internal intruders at the second level. ... We identified several issues and challenges in the literature ...
This chapter will review existing research works related to the security and privacy challenges in the smart home network. The structure of this chapter is organized into three levels: "terminal device—user interface—smart application.". Section 2.1 will review the side-channel privacy risks faced by the terminal equipment, including ...
We performed a systematic literature review (SLR) on the use of AI for the provision of cybersecurity, ... device authentication is the process of authenticating devices based on their credentials or behaviour in the network to ensure the security of machine-to-machine communication. Researchers are actively working in the field of sensor ...
A Systematic Literature Review on 5G Security. It is expected that the creation of next-generation wireless networks would result in the availability of high-speed and low-latency connectivity for every part of our life. As a result, it is important that the network is secure. The network's security environment has grown more complicated as a ...
Computer Science and Software Engineering. ISSN: 2277-128X (Volume-8, Issue-5) A Review on Network Security. Rahul Jain. Scholar, Department of Computer Science & E ngineering, ABESIT, Ghaziabad ...
In this study, a survey was conducted to find out the development trend in SDN security and security architecture of SDN using systematic literature review (SLR) method, and SLR result stated that research in architecture of network security is still very relevant to be done.
A Systematic Literature Review on the Cyber Security 1Dr.Yusuf Perwej, 2Prof. (Dr.) Syed Qamar Abbas, 3Jai Pratap Dixit, 4Dr. Nikhat ... Cyber Crime, Network Security, Internet of Things (IoT) Security, Cyber Security Frameworks, Malware. I. Introduction The Internet is one of the most important inventions of the twenty-first century that has ...
A systematic literature review is a methodology followed to identify, ... It is obvious that for efficient network security, the IDS demands a higher Accuracy and Detection rate. So, to investigate the efficiency and effectiveness of the proposed methodology, these two performance metrics should be considered. For a typical IDS designed using ...
Therefore, a detailed and systematic literature review on "System Security Assurance" has been conducted in this paper. The motive of this paper is to study state-of-the-art, research trends, limitations, and future research directions in security assurance of the ICT and CPSs in a wide range of domains.
This literature review looks at the research that has been published in the area of cryptography as it relates to network data and global communications security. It compares and contrasts the research pointing out overall trends in what has already been published on this subject. It analyzes the role that cryptography has played and will play ...
In Machine Learning, the datasets used to build models are one of the main factors limiting what these models can achieve and how good their predictive performance is. Machine Learning applications for cyber-security or computer security are numerous including cyber threat mitigation and security infrastructure enhancement through pattern recognition, real-time attack detection, and in-depth ...
3 Literature Review. 3.1 Vulnerabilities to Cloud Computing. See Fig. 1. Fig. 1. Security vulnerabilities in cloud computing . ... A firewall is crucial to network security as it filters each incoming packet and sits between an internal network and the outside world. A combination of a firewall and a VPN allows for more precise server access ...