{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T13:11:23Z","timestamp":1724937083972},"reference-count":86,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/100002186","name":"Lockheed Martin Corp","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002186","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004489","name":"Mitacs","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004489","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1016\/j.cose.2021.102580","type":"journal-article","created":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T07:08:27Z","timestamp":1639724907000},"page":"102580","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":56,"special_numbering":"C","title":["Cloud computing security: A survey of service-based models"],"prefix":"10.1016","volume":"114","author":[{"given":"Fatemeh","family":"Khoda Parast","sequence":"first","affiliation":[]},{"given":"Chandni","family":"Sindhav","sequence":"additional","affiliation":[]},{"given":"Seema","family":"Nikam","sequence":"additional","affiliation":[]},{"given":"Hadiseh","family":"Izadi Yekta","sequence":"additional","affiliation":[]},{"given":"Kenneth B.","family":"Kent","sequence":"additional","affiliation":[]},{"given":"Saqib","family":"Hakak","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2021.102580_bib0001","series-title":"Social Networking and Computational Intelligence","first-page":"119","article-title":"A survey on cloud computing security issues and cryptographic techniques","author":"Agarwal","year":"2020"},{"key":"10.1016\/j.cose.2021.102580_bib0002","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.ins.2015.01.025","article-title":"Security in cloud computing: opportunities and challenges","volume":"305","author":"Ali","year":"2015","journal-title":"Inf. Sci."},{"key":"10.1016\/j.cose.2021.102580_sbref0003","series-title":"An Analysis of the Cloud Computing Security Problem","author":"Almorsy","year":"2016"},{"key":"10.1016\/j.cose.2021.102580_bib0004","doi-asserted-by":"crossref","DOI":"10.17485\/ijst\/2019\/v12i3\/139557","article-title":"A taxonomy of virtualization security issues in cloud computing environments","author":"Almutairy","year":"2019","journal-title":"Indian Journal of Science and Technology"},{"key":"10.1016\/j.cose.2021.102580_bib0005","doi-asserted-by":"crossref","first-page":"754","DOI":"10.1016\/j.future.2017.08.016","article-title":"Improving security in cloud by formal modeling of iaas resources","volume":"87","author":"Amato","year":"2018","journal-title":"Future Generation Computer Systems"},{"key":"10.1016\/j.cose.2021.102580_bib0006","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/j.jnca.2017.06.001","article-title":"Cross-vm cache-based side channel attacks and proposed prevention mechanisms: a survey","volume":"93","author":"Anwar","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"10.1016\/j.cose.2021.102580_bib0007","article-title":"Cloud computing security issues in infrastructure as a service","volume":"2","author":"Arora","year":"2012","journal-title":"International journal of advanced research in computer science and software engineering"},{"key":"10.1016\/j.cose.2021.102580_bib0008","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/j.comnet.2019.01.013","article-title":"Security in hardware assisted virtualization for cloud computing - state of the art issues and challenges","volume":"151","author":"Asvija","year":"2019","journal-title":"Comput. Networks"},{"key":"10.1016\/j.cose.2021.102580_sbref0009","series-title":"Understanding the Top 10 deldDel deliIns deltThinspace OWASP Vulnerabilities","author":"Bach-Nutman","year":"2020"},{"key":"10.1016\/j.cose.2021.102580_bib0010","series-title":"2015\u00a0IEEE International Conference on Information Reuse and Integration, IRI 2015, San Francisco, CA, USA, August 13\u201315, 2015","first-page":"158","article-title":"DCCSOA: A dynamic cloud computing service-oriented architecture","author":"Bahrami","year":"2015"},{"key":"10.1016\/j.cose.2021.102580_bib0011","first-page":"1681908:1","article-title":"Securing cloud hypervisors: a survey of the threats, vulnerabilities, and countermeasures","volume":"2018","author":"Barrowclough","year":"2018","journal-title":"Secur. Commun. Networks"},{"key":"10.1016\/j.cose.2021.102580_bib0012","series-title":"IEEE 8th Annual Computing and Communication Workshop and Conference, CCWC 2018, Las Vegas, NV, USA, January 8\u201310, 2018","first-page":"347","article-title":"Cloud computing security challenges & solutions-a survey","author":"Basu","year":"2018"},{"issue":"1","key":"10.1016\/j.cose.2021.102580_bib0013","doi-asserted-by":"crossref","first-page":"10:1","DOI":"10.1145\/2775111","article-title":"A survey on hypervisor-based monitoring: approaches, applications, and evolutions","volume":"48","author":"Bauman","year":"2015","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.cose.2021.102580_bib0014","series-title":"Engineering Scalable, Elastic, and Cost-Efficient Cloud Computing Applications - The CloudScale Method","first-page":"3","article-title":"Introduction","author":"Becker","year":"2017"},{"key":"10.1016\/j.cose.2021.102580_bib0015","series-title":"World Congress on Services, SERVICES 2011, Washington, DC, USA, July 4\u20139, 2011","first-page":"594","article-title":"NIST cloud computing reference architecture","author":"Bohn","year":"2011"},{"key":"10.1016\/j.cose.2021.102580_bib0016","series-title":"2012 Colloquium in Information Science and Technology, CIST 2012, Fez, Morocco, October 22\u201324, 2012","first-page":"26","article-title":"Cloud computing: Security challenges","author":"Bouayad","year":"2012"},{"key":"10.1016\/j.cose.2021.102580_bib0017","article-title":"A comparative study on secure network virtualization","author":"Cabuk","year":"2008","journal-title":"HP Laboratories"},{"key":"10.1016\/j.cose.2021.102580_bib0018","series-title":"The 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) \/ The 13th International Conference on Future Networks and Communications (FNC-2018) \/ Affiliated Workshops, Gran Canaria, Spain, August 13\u201315, 2018","first-page":"328","article-title":"Iaas cloud model security issues on behalf cloud provider and user security behaviors","author":"Chawki","year":"2018"},{"key":"10.1016\/j.cose.2021.102580_bib0019","series-title":"2015 Science and Information Conference (SAI)","first-page":"162","article-title":"Software as a service: Understanding security issues","author":"Chouhan","year":"2015"},{"key":"10.1016\/j.cose.2021.102580_bib0020","series-title":"Computer Aided Verification - 30th International Conference, CAV 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14\u201317, 2018, Proceedings, Part I","first-page":"38","article-title":"Formal reasoning about the security of amazon web services","author":"Cook","year":"2018"},{"key":"10.1016\/j.cose.2021.102580_bib0021","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.compeleceng.2016.03.004","article-title":"Cloud security: emerging threats and current solutions","volume":"59","author":"Coppolino","year":"2017","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.cose.2021.102580_bib0022","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1016\/j.procs.2015.04.245","article-title":"Understanding ddos attack & its effect in cloud environment","volume":"49","author":"Deshmukh","year":"2015","journal-title":"Procedia Comput Sci"},{"issue":"6","key":"10.1016\/j.cose.2021.102580_bib0023","doi-asserted-by":"crossref","first-page":"50","DOI":"10.5815\/ijitcs.2017.06.07","article-title":"Cloud computing: a review of the concepts and deployment models","volume":"9","author":"Diaby","year":"2017","journal-title":"International Journal of Information Technology and Computer Science"},{"issue":"2","key":"10.1016\/j.cose.2021.102580_bib0024","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/s10207-013-0208-7","article-title":"Security issues in cloud environments: a survey","volume":"13","author":"Fernandes","year":"2014","journal-title":"Int. J. Inf. Sec."},{"key":"10.1016\/j.cose.2021.102580_bib0025","article-title":"Flexera 2020 state of the cloud report","author":"Flexera","year":"2020","journal-title":"Applied Computing and Informatics"},{"key":"10.1016\/j.cose.2021.102580_bib0026","series-title":"Proceedings of the 7th International Conference on Management of Computational and Collective Intelligence in Digital EcoSystems, Caraguatatuba, Brazil, October 25, - 29, 2015","first-page":"148","article-title":"Cloud forensics challenges from a service model standpoint: IaaS, PaaS and SaaS","author":"Freet","year":"2015"},{"key":"10.1016\/j.cose.2021.102580_bib0027","series-title":"A Survey on Security Challenges in Cloud Computing","author":"George Amalarethinam","year":"2019"},{"key":"10.1016\/j.cose.2021.102580_bib0028","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.future.2017.02.022","article-title":"An autonomic resource provisioning approach for service-based cloud applications: a hybrid approach","volume":"78","author":"Ghobaei-Arani","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"10.1016\/j.cose.2021.102580_bib0029","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1109\/TCC.2015.2415794","article-title":"Cloud-trust - a security assessment model for infrastructure as a service (iaas) clouds","volume":"5","author":"Gonzales","year":"2017","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"2","key":"10.1016\/j.cose.2021.102580_bib0030","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2010.115","article-title":"Understanding cloud computing vulnerabilities","volume":"9","author":"Grobauer","year":"2011","journal-title":"IEEE Secur. Priv."},{"issue":"3","key":"10.1016\/j.cose.2021.102580_bib0031","first-page":"32","article-title":"A comprehensive survey on privacy and security issues in cloud computing, internet of things and cloud of things","volume":"10","author":"Guerbouj","year":"2019","journal-title":"Int. J. Serv. Sci. Manag. Eng. Technol."},{"key":"10.1016\/j.cose.2021.102580_bib0032","series-title":"Intelligent Computing Methodologies - 10th International Conference, ICIC 2014, Taiyuan, China, August 3\u20136, 2014. Proceedings","first-page":"434","article-title":"Dynamically changing service level agreements (slas) management in cloud computing","author":"Halboob","year":"2014"},{"issue":"1","key":"10.1016\/j.cose.2021.102580_bib0033","doi-asserted-by":"crossref","first-page":"5:1","DOI":"10.1186\/1869-0238-4-5","article-title":"An analysis of security issues for cloud computing","volume":"4","author":"Hashizume","year":"2013","journal-title":"J. Internet Serv. Appl."},{"key":"10.1016\/j.cose.2021.102580_bib0034","series-title":"44th Hawaii International International Conference on Systems Science (HICSS-44 2011), Proceedings, 4\u20137 January 2011, Koloa, Kauai, HI, USA","first-page":"1","article-title":"Storm clouds rising: Security challenges for iaas cloud computing","author":"Hay","year":"2011"},{"issue":"4","key":"10.1016\/j.cose.2021.102580_bib0035","doi-asserted-by":"crossref","first-page":"68:1","DOI":"10.1145\/2767181","article-title":"The state of public infrastructure-as-a-service cloud security","volume":"47","author":"Huang","year":"2015","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"10.1016\/j.cose.2021.102580_bib0036","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1109\/TPDS.2015.2398438","article-title":"Cloud performance modeling with benchmark evaluation of elastic scaling strategies","volume":"27","author":"Hwang","year":"2016","journal-title":"IEEE Trans. Parallel Distributed Syst."},{"key":"10.1016\/j.cose.2021.102580_bib0037","unstructured":"IBM Cloud Education, 2021. IaaS vs PaaS vs SaaS, understand and compare the three most popular cloud computing service models."},{"key":"10.1016\/j.cose.2021.102580_bib0038","series-title":"2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)","first-page":"1","article-title":"Study of security issues in platform-as-a-service (PAAS) cloud model","author":"Isharufe","year":"2020"},{"key":"10.1016\/j.cose.2021.102580_bib0039","series-title":"2016 18th International Conference on Advanced Communication Technology (ICACT)","first-page":"117","article-title":"Analysis of cloud computing attacks and countermeasures","author":"Jabir","year":"2016"},{"key":"10.1016\/j.cose.2021.102580_bib0040","series-title":"IEEE 7th International Conference on Software Security and Reliability, SERE 2013, Gaithersburg, MD, USA, June 18\u201320, 2013","first-page":"218","article-title":"VULCAN: vulnerability assessment framework for cloud computing","author":"Kamongi","year":"2013"},{"key":"10.1016\/j.cose.2021.102580_bib0041","series-title":"2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS)","first-page":"516","article-title":"Performance evaluation of aws and ibm cloud platforms for security mechanism","author":"Kaur","year":"2018"},{"issue":"1","key":"10.1016\/j.cose.2021.102580_bib0042","first-page":"188","article-title":"A simulation study of syn flood attack in cloud computing environment","volume":"26","author":"Khalaf","year":"2019","journal-title":"AUS journal"},{"key":"10.1016\/j.cose.2021.102580_bib0043","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.jnca.2016.05.010","article-title":"A survey of security issues for cloud computing","volume":"71","author":"Khan","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.cose.2021.102580_bib0044","series-title":"The 11th International Conference on Future Networks and Communications (FNC 2016) \/ The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) \/ Affiliated Workshops, August 15\u201318, 2016, Montreal, Quebec, Canada","first-page":"485","article-title":"Identifying cloud security threats to strengthen cloud computing adoption framework","author":"Khan","year":"2016"},{"key":"10.1016\/j.cose.2021.102580_bib0045","series-title":"2014\u00a0IEEE GLOBECOM Workshops, Austin, TX, USA, December 8\u201312, 2014","first-page":"59","article-title":"A survey of common security vulnerabilities and corresponding countermeasures for saas","author":"Kim","year":"2014"},{"key":"10.1016\/j.cose.2021.102580_bib0046","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1016\/j.procs.2016.05.156","article-title":"Security issues in service model of cloud computing environment","volume":"87","author":"Krishna","year":"2016","journal-title":"Procedia Comput Sci"},{"key":"10.1016\/j.cose.2021.102580_bib0047","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1016\/j.future.2016.10.008","article-title":"Towards a security-enhanced paas platform for multi-cloud applications","volume":"67","author":"Kritikos","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.cose.2021.102580_bib0048","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cosrev.2019.05.002","article-title":"On cloud security requirements, threats, vulnerabilities and countermeasures: a survey","volume":"33","author":"Kumar","year":"2019","journal-title":"Comput. Sci. Rev."},{"key":"10.1016\/j.cose.2021.102580_sbref0049","series-title":"Vulnerabilities Mapping Based on OWASP-SANS: a Survey for Static Application Security Testing (SAST)","author":"Li","year":"2020"},{"key":"10.1016\/j.cose.2021.102580_bib0050","series-title":"International Conference on Machine Learning and Cybernetics, ICMLC 2010, Qingdao, China, July 11\u201314, 2010, Proceedings","first-page":"2843","article-title":"A trusted computing environment model in cloud architecture","author":"Li","year":"2010"},{"issue":"3","key":"10.1016\/j.cose.2021.102580_bib0051","doi-asserted-by":"crossref","DOI":"10.5626\/JCSE.2015.9.3.119","article-title":"A survey of security and privacy challenges in cloud computing: solutions and future directions","volume":"9","author":"Liu","year":"2015","journal-title":"J. Comput. Sci. Eng."},{"key":"10.1016\/j.cose.2021.102580_bib0052","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.dss.2018.12.005","article-title":"Determinants of software-as-a-service benefits and impact on firm performance","volume":"117","author":"Loukis","year":"2019","journal-title":"Decis. Support Syst."},{"key":"10.1016\/j.cose.2021.102580_bib0053","series-title":"27th open Grid Forum (OGF27), G2C-Net Workshop: From Grid to Cloud Networks","article-title":"Considerations on the interoperability of and between cloud computing standards","author":"Machado","year":"2009"},{"issue":"2","key":"10.1016\/j.cose.2021.102580_bib0054","doi-asserted-by":"crossref","DOI":"10.26483\/ijarcs.v9i2.5760","article-title":"Cloud computing-technologies","volume":"9","author":"Malik","year":"2018","journal-title":"International Journal of Advanced Research in Computer Science"},{"key":"10.1016\/j.cose.2021.102580_bib0055","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1016\/j.jnca.2013.10.004","article-title":"Resource management for infrastructure as a service (iaas) in cloud computing: a survey","volume":"41","author":"Manvi","year":"2014","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.cose.2021.102580_bib0056","series-title":"Technical Report","article-title":"Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations (2nd Draft)","author":"McKay","year":"2018"},{"issue":"2","key":"10.1016\/j.cose.2021.102580_bib0057","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1007\/s11227-012-0831-5","article-title":"A survey on security issues and solutions at different layers of cloud computing","volume":"63","author":"Modi","year":"2013","journal-title":"J. Supercomput."},{"issue":"9","key":"10.1016\/j.cose.2021.102580_bib0058","first-page":"18","article-title":"Enhancement of cloud computing security with secure data storage using aes","volume":"2","author":"Pancholi","year":"2016","journal-title":"International Journal for Innovative Research in Science and Technology"},{"key":"10.1016\/j.cose.2021.102580_bib0059","series-title":"Advances in Machine Learning and Computational Intelligence","first-page":"513","article-title":"A survey on cloud computing security issues, attacks and countermeasures","author":"Panda","year":"2021"},{"key":"10.1016\/j.cose.2021.102580_bib0060","series-title":"Proceedings of the 39th International Conference on Software Engineering, ICSE 2017, Buenos Aires, Argentina, May 20\u201328, 2017 - Companion Volume","first-page":"285","article-title":"Paas - black or white: an investigation into software development model for building retail industry saas","author":"Pham","year":"2017"},{"issue":"3","key":"10.1016\/j.cose.2021.102580_bib0061","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1007\/s12045-014-0030-1","article-title":"Cloud computing","volume":"19","author":"Rajaraman","year":"2014","journal-title":"Resonance"},{"key":"10.1016\/j.cose.2021.102580_bib0062","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1186\/s13677-017-0098-8","article-title":"Classifying malware attacks in iaas cloud environments","volume":"6","author":"Rakotondravony","year":"2017","journal-title":"J. Cloud Comput."},{"issue":"4","key":"10.1016\/j.cose.2021.102580_bib0063","doi-asserted-by":"crossref","first-page":"1131","DOI":"10.26438\/ijcse\/v7i4.11311136","article-title":"Virtualization and its role in cloud computing environment","volume":"7","author":"Rashid","year":"2019","journal-title":"International Journal of Computer Sciences and Engineering"},{"issue":"1","key":"10.1016\/j.cose.2021.102580_bib0064","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.cose.2011.10.006","article-title":"Building safe paas clouds: a survey on security in multitenant software platforms","volume":"31","author":"Rodero-Merino","year":"2012","journal-title":"Comput. Secur."},{"issue":"1","key":"10.1016\/j.cose.2021.102580_bib0065","first-page":"29","article-title":"Security threats in cloud computing: trend and challenges","volume":"2","author":"e Rubab","year":"2020","journal-title":"International Journal of Computing and Communication Networks"},{"key":"10.1016\/j.cose.2021.102580_bib0066","series-title":"IEEE 31st Symposium on Reliable Distributed Systems, SRDS 2012, Irvine, CA, USA, October 8\u201311, 2012","first-page":"463","article-title":"Security problems of platform-as-a-service (PaaS) clouds and practical solutions to the problems","author":"Sandikkaya","year":"2012"},{"key":"10.1016\/j.cose.2021.102580_bib0067","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1016\/j.procs.2015.04.192","article-title":"A review on cloud data security and its mitigation techniques","volume":"48","author":"Selvamani","year":"2015","journal-title":"Procedia Comput Sci"},{"key":"10.1016\/j.cose.2021.102580_bib0068","series-title":"World Congress on Services, SERVICES 2011, Washington, DC, USA, July 4\u20139, 2011","first-page":"524","article-title":"Cloud computing security-trends and research directions","author":"Sengupta","year":"2011"},{"key":"10.1016\/j.cose.2021.102580_bib0069","series-title":"Intelligent Computing and Networking","first-page":"63","article-title":"Security issues in cloud computing","author":"Shaikh","year":"2020"},{"issue":"1","key":"10.1016\/j.cose.2021.102580_bib0070","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1504\/IJGUC.2021.112475","article-title":"A survey on resolving security issues in saas through software defined networks","volume":"12","author":"Shyam","year":"2021","journal-title":"Int. J. Grid Util. Comput."},{"key":"10.1016\/j.cose.2021.102580_bib0071","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.jnca.2016.11.027","article-title":"Cloud security issues and challenges: a survey","volume":"79","author":"Singh","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"10.1016\/j.cose.2021.102580_bib0072","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1007\/s41870-018-0108-1","article-title":"Security concerns and countermeasures in cloud computing: a qualitative analysis","volume":"11","author":"Singh","year":"2019","journal-title":"International Journal of Information Technology"},{"key":"10.1016\/j.cose.2021.102580_bib0073","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.jnca.2016.09.002","article-title":"A survey on cloud computing security: issues, threats, and solutions","volume":"75","author":"Singh","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"10.1016\/j.cose.2021.102580_bib0074","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","article-title":"A survey on security issues in service delivery models of cloud computing","volume":"34","author":"Subashini","year":"2011","journal-title":"J. Netw. Comput. Appl."},{"issue":"12","key":"10.1016\/j.cose.2021.102580_bib0075","doi-asserted-by":"crossref","first-page":"9493","DOI":"10.1007\/s11227-020-03213-1","article-title":"A survey on security challenges in cloud computing: issues, threats, and solutions","volume":"76","author":"Tabrizchi","year":"2020","journal-title":"J. Supercomput."},{"key":"10.1016\/j.cose.2021.102580_bib0076","first-page":"8887","article-title":"Implementation of cloud computing service delivery models (IaaS, PaaS) by aws and microsoft azure: a survey","volume":"975","author":"Toraskar","year":"2018","journal-title":"Int J Comput Appl"},{"issue":"1","key":"10.1016\/j.cose.2021.102580_bib0077","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/s00607-010-0140-x","article-title":"Locking the sky: a survey on iaas cloud security","volume":"91","author":"Vaquero","year":"2011","journal-title":"Computing"},{"key":"10.1016\/j.cose.2021.102580_sbref0078","series-title":"Next Generation Cloud Computing: New Trends and Research Directions","author":"Varghese","year":"2017"},{"key":"10.1016\/j.cose.2021.102580_bib0079","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1016\/j.proeng.2017.01.087","article-title":"Cloud computing: business perspectives, benefits and challenges for small and medium enterprises (case of latvia)","volume":"178","author":"Vasiljeva","year":"2017","journal-title":"Procedia Eng"},{"key":"10.1016\/j.cose.2021.102580_bib0080","series-title":"Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22\u201324, 2011, Proceedings, Part IV","first-page":"445","article-title":"Cloud computing security issues and challenges: A survey","author":"Verma","year":"2011"},{"issue":"6","key":"10.1016\/j.cose.2021.102580_bib0081","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42979-020-00353-2","article-title":"Cloud computing security issues: a stakeholder\u2019s perspective","volume":"1","author":"Verma","year":"2020","journal-title":"SN Computer Science"},{"issue":"2","key":"10.1016\/j.cose.2021.102580_bib0082","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/s10845-012-0661-6","article-title":"Towards an accurate evaluation of quality of cloud service in service-oriented cloud computing","volume":"25","author":"Wang","year":"2014","journal-title":"J. Intell. Manuf."},{"issue":"5","key":"10.1016\/j.cose.2021.102580_bib0083","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/MCC.2018.053711671","article-title":"The economics of pay-per-use pricing","volume":"5","author":"Weinman","year":"2018","journal-title":"IEEE Cloud Comput."},{"issue":"2","key":"10.1016\/j.cose.2021.102580_bib0084","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MCOM.2018.1700621","article-title":"A multi-level ddos mitigation framework for the industrial internet of things","volume":"56","author":"Yan","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.cose.2021.102580_bib0085","series-title":"9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS \u201914, Kyoto, Japan - June 03 - 06, 2014","first-page":"317","article-title":"After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across iaas cloud","author":"Zhang","year":"2014"},{"issue":"3","key":"10.1016\/j.cose.2021.102580_bib0086","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","article-title":"Addressing cloud computing security issues","volume":"28","author":"Zissis","year":"2012","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404821003977?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404821003977?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,3,29]],"date-time":"2024-03-29T00:38:16Z","timestamp":1711672696000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404821003977"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":86,"alternative-id":["S0167404821003977"],"URL":"http:\/\/dx.doi.org\/10.1016\/j.cose.2021.102580","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2022,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Cloud computing security: A survey of service-based models","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2021.102580","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"102580"}}