{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T09:10:12Z","timestamp":1765012212272,"version":"3.46.0"},"reference-count":140,"publisher":"Wiley","issue":"27-28","license":[{"start":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T00:00:00Z","timestamp":1761782400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2025,12,25]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>Cloud computing offers revolutionary data storage and management features through advancements in elastic scaling and affordable usage rates. However, the widespread adoption of cloud computing solutions has created significant security challenges, including attacks from internal staff, unauthorized system access, confidentiality breaches, and difficulties in meeting sector\u2010specific compliance requirements. This research technically investigates cloud storage security through a multilevel evaluation process, assessing vulnerabilities in physical infrastructure, application systems, and user interfaces, as well as implementing the principles of confidentiality, integrity, and availability (CIA). The study hypothesizes that traditional security solutions based solely on encryption are inadequate for modern cloud security requirements. Therefore, a comprehensive security system is needed\u2014one that incorporates access regulations with cryptographic protocols and continuous intrusion monitoring to fully protect data assets. To validate this hypothesis, a systematic review was conducted in which authors evaluated existing studies on cloud system vulnerabilities, attack methods, and defensive strategies. The study assesses key security risks within the Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS) cloud service models. The analysis evaluates cloud security mechanisms by examining encryption algorithms and access control models to determine their performance in cloud computing environments. Emerging technologies such as software\u2010defined networking (SDN) and network function virtualization (NFV) are examined to determine their effectiveness in improving cloud security and their associated security challenges. Findings show that, while encryption and existing security tools remain essential, they are insufficient to provide complete protection against modern threats such as API vulnerabilities, unauthorized access, and SDN controller attacks. This research concludes that protection strategies must incorporate multiple layers of security, integrating a continuous monitoring environment along with adaptive user authentication and policy compliance management to effectively address current threat vectors.<\/jats:p>","DOI":"10.1002\/cpe.70393","type":"journal-article","created":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:35:34Z","timestamp":1761809734000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["In\u2010Depth Literature Review of Cloud Computing Data Hazards and Mitigation Strategies"],"prefix":"10.1002","volume":"37","author":[{"given":"Atul Kumar","family":"Singh","sequence":"first","affiliation":[{"name":"National Institute of Technology  Kurukshetra India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4106-1278","authenticated-orcid":false,"given":"Kriti","family":"Bhushan","sequence":"additional","affiliation":[{"name":"National Institute of Technology  Kurukshetra India"}]}],"member":"311","published-online":{"date-parts":[[2025,10,30]]},"reference":[{"key":"e_1_2_11_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/19331680802425479"},{"volume-title":"The Growth in Connected IoT Devices Is Expected to Generate 79.4 ZB of Data in 2025","year":"2020","author":"IDC","key":"e_1_2_11_3_1"},{"key":"e_1_2_11_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.022"},{"key":"e_1_2_11_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.039"},{"key":"e_1_2_11_6_1","unstructured":"Casemore \u201cNetwork Modernization: Essential for Digital Transformation and Multicloud \u201dWhite Paper US45603019 (IDC November 2019)."},{"volume-title":"Capital One Breach and Cloud Security Concerns","year":"2019","author":"Schneier B.","key":"e_1_2_11_7_1"},{"volume-title":"Tesla Insider Threat Case: Employee Prevents Internal Malware Attack","year":"2020","author":"Krebs B.","key":"e_1_2_11_8_1"},{"key":"e_1_2_11_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1945-y"},{"key":"e_1_2_11_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.001"},{"volume-title":"Facebook's API Security Flaw Exposed 540M User Records","year":"2019","author":"Whittaker Z.","key":"e_1_2_11_11_1"},{"key":"e_1_2_11_12_1","unstructured":"Akamai \u201cAnalysis of the Largest GitHub DDoS Attack \u201dAkamai Security Blog March 2018 https:\/\/www.akamai.com\/blog\/security\/akamai\u2010mitigates\u2010largest\u2010recorded\u2010ddos\u2010attack\u2010against\u2010a\u2010customer."},{"volume-title":"Verizon AWS S3 Misconfiguration Data Leak Exposed 14M Customer Records","year":"2017","author":"UpGuard","key":"e_1_2_11_13_1"},{"volume-title":"Kaseya Ransomware Attack: Threat Overview and Mitigation Strategies","year":"2021","author":"U.S. Cybersecurity and Infrastructure Security Agency (CISA)","key":"e_1_2_11_14_1"},{"issue":"14","key":"e_1_2_11_15_1","first-page":"563","article-title":"Managing the Cloud Storage Using Deduplication and Secured Fuzzy Keyword Search for Multiple Data Owners","volume":"118","author":"Kodhai E.","year":"2018","journal-title":"International Journal of Pure and Applied Mathematics"},{"key":"e_1_2_11_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2016.1192520"},{"key":"e_1_2_11_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.06.006"},{"key":"e_1_2_11_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.05.002"},{"key":"e_1_2_11_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.04.011"},{"key":"e_1_2_11_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2019.03.002"},{"key":"e_1_2_11_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919982"},{"key":"e_1_2_11_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009876"},{"key":"e_1_2_11_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102642"},{"key":"e_1_2_11_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03213-1"},{"key":"e_1_2_11_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11199005"},{"key":"e_1_2_11_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2387"},{"key":"e_1_2_11_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2929794"},{"key":"e_1_2_11_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3073203"},{"key":"e_1_2_11_29_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi14010011"},{"key":"e_1_2_11_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102580"},{"key":"e_1_2_11_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2020.10.021"},{"key":"e_1_2_11_32_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22030927"},{"key":"e_1_2_11_33_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v13i2.pp1867-1879"},{"key":"e_1_2_11_34_1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2024.152010"},{"key":"e_1_2_11_35_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13677\u2010024\u201000605\u2010z"},{"key":"e_1_2_11_36_1","article-title":"Arx: A Strongly Encrypted Database System","volume":"2016","author":"Poddar R.","year":"2016","journal-title":"IACR Cryptology Eprint Archive"},{"key":"e_1_2_11_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102980.3103007"},{"key":"e_1_2_11_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978386"},{"key":"e_1_2_11_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00030"},{"key":"e_1_2_11_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"e_1_2_11_41_1","first-page":"20","volume-title":"HOTOS'05: Proceedings of the 10th Conference on Hot Topics in Operating Systems","author":"Garfinkel T.","year":"2005"},{"key":"e_1_2_11_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978351"},{"key":"e_1_2_11_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.06.027"},{"key":"e_1_2_11_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.12.024"},{"key":"e_1_2_11_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2107556.2107564"},{"key":"e_1_2_11_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.032213.00009"},{"volume-title":"AWS Security Best Practices","year":"2016","author":"Amazon Web Services","key":"e_1_2_11_47_1"},{"volume-title":"Best Practices for Security and Compliance With Amazon Web Services","year":"2013","author":"Trend Micro","key":"e_1_2_11_48_1"},{"volume-title":"Security Guidance for Critical Areas of Focus in Cloud Computing v4.0","year":"2017","author":"Mogull R.","key":"e_1_2_11_49_1"},{"key":"e_1_2_11_50_1","first-page":"47","volume-title":"Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques","author":"Shamir A.","year":"1984"},{"key":"e_1_2_11_51_1","first-page":"213","volume-title":"Advances in Cryptology\u2014CRYPTO 2001. CRYPTO 2001. Lecture Notes in Computer Science","author":"Boneh D.","year":"2001"},{"key":"e_1_2_11_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.051"},{"key":"e_1_2_11_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.07.086"},{"key":"e_1_2_11_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2020.02.031"},{"key":"e_1_2_11_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2021.02.015"},{"key":"e_1_2_11_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2021.02.024"},{"key":"e_1_2_11_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102332"},{"key":"e_1_2_11_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2021.05.034"},{"key":"e_1_2_11_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2021.11.014"},{"key":"e_1_2_11_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2022.06.028"},{"key":"e_1_2_11_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2023.103817"},{"key":"e_1_2_11_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2024.103183"},{"key":"e_1_2_11_63_1","first-page":"457","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic\nTechniques (EUROCRYPT)","author":"Sahai A.","year":"2005"},{"key":"e_1_2_11_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.05.609"},{"key":"e_1_2_11_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.06.080"},{"key":"e_1_2_11_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102914"},{"key":"e_1_2_11_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2022.102556"},{"key":"e_1_2_11_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103606"},{"key":"e_1_2_11_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100438"},{"key":"e_1_2_11_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.04.026"},{"key":"e_1_2_11_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2022.103696"},{"key":"e_1_2_11_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2024.104956"},{"key":"e_1_2_11_73_1","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2025.058717"},{"key":"e_1_2_11_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.07.054"},{"key":"e_1_2_11_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101587"},{"key":"e_1_2_11_76_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102425"},{"key":"e_1_2_11_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.10.008"},{"key":"e_1_2_11_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.03.032"},{"key":"e_1_2_11_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.102880"},{"key":"e_1_2_11_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijin.2022.04.001"},{"key":"e_1_2_11_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.12.005"},{"key":"e_1_2_11_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2024.102295"},{"key":"e_1_2_11_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"e_1_2_11_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"e_1_2_11_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.03.002"},{"key":"e_1_2_11_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.12.060"},{"key":"e_1_2_11_87_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.10.015"},{"key":"e_1_2_11_88_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.08.014"},{"key":"e_1_2_11_89_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103542"},{"key":"e_1_2_11_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.04.114"},{"key":"e_1_2_11_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102075"},{"key":"e_1_2_11_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102271"},{"key":"e_1_2_11_93_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103353"},{"key":"e_1_2_11_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.12.035"},{"key":"e_1_2_11_95_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109816"},{"issue":"7","key":"e_1_2_11_96_1","first-page":"7314","article-title":"Cryptosystem Design Based on Hermitian Curves for IoT Security","volume":"77","author":"Alzubi O. A.","year":"2021","journal-title":"Journal of Supercomputing"},{"key":"e_1_2_11_97_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103002"},{"key":"e_1_2_11_98_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.07.020"},{"key":"e_1_2_11_99_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102176"},{"key":"e_1_2_11_100_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.054"},{"key":"e_1_2_11_101_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2022.103629"},{"key":"e_1_2_11_102_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.03.032"},{"key":"e_1_2_11_103_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.02.011"},{"key":"e_1_2_11_104_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.01.004"},{"key":"e_1_2_11_105_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102392"},{"key":"e_1_2_11_106_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.09.033"},{"key":"e_1_2_11_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063509.2063512"},{"volume-title":"OSDI'10: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation","year":"2010","author":"Feldman J.","key":"e_1_2_11_108_1"},{"key":"e_1_2_11_109_1","first-page":"17","volume-title":"FAST '07: Proceedings of the 5th USENIX Conference on File and Storage Technologies","author":"Pinheiro E.","year":"2007"},{"key":"e_1_2_11_110_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263936"},{"key":"e_1_2_11_111_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2016.8104"},{"key":"e_1_2_11_112_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.09.119"},{"key":"e_1_2_11_113_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-015-0041-5"},{"key":"e_1_2_11_114_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService.2015.71"},{"key":"e_1_2_11_115_1","first-page":"140","volume-title":"2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity)","author":"Gai K.","year":"2016"},{"key":"e_1_2_11_116_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.138"},{"key":"e_1_2_11_117_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7959"},{"key":"e_1_2_11_118_1","doi-asserted-by":"publisher","DOI":"10.1109\/SDS.2017.7939144"},{"key":"e_1_2_11_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6957144"},{"key":"e_1_2_11_120_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2017.8088621"},{"key":"e_1_2_11_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.82"},{"key":"e_1_2_11_122_1","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987395"},{"key":"e_1_2_11_123_1","first-page":"4363","article-title":"Artificial Neural Networks Training Algorithm Integrating Invasive Weed Optimization With Differential Evolutionary Model","volume":"12","author":"Movassagh A. A.","year":"2021","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"e_1_2_11_124_1","article-title":"Hashed Needham Schroeder Industrial IoT Based Cost Optimized Deep Secured Data Transmission in Cloud","volume":"212","author":"Alzubi J. A.","year":"2019","journal-title":"Measurement"},{"key":"e_1_2_11_125_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109997"},{"issue":"2","key":"e_1_2_11_126_1","first-page":"169","article-title":"An Energy Efficient Fault Tolerance Technique Based on Load Balancing Algorithm for High\u2010Performance Computing in Cloud Computing","volume":"8","author":"Jahanpour H.","year":"2020","journal-title":"Journal of Electrical and Computer Engineering Innovation (JECEI)"},{"issue":"1","key":"e_1_2_11_127_1","first-page":"1","article-title":"Cloud Data Storage Security and Privacy Challenges: A Review","volume":"17","author":"Alshammari R.","year":"2021","journal-title":"Journal of Information Privacy and Security"},{"issue":"1","key":"e_1_2_11_128_1","first-page":"1","article-title":"Compliance\u2010Aware Cloud Storage Data Placement","volume":"9","author":"Hsu Y.","year":"2020","journal-title":"Journal of Cloud Computing"},{"key":"e_1_2_11_129_1","first-page":"46344","article-title":"Data Portability Challenges and Solutions in Cloud Computing","volume":"9","author":"Zhang Y.","year":"2021","journal-title":"IEEE Access"},{"issue":"1","key":"e_1_2_11_130_1","first-page":"1","article-title":"Cloud Service Reliability: A Systematic Literature Review and Future Research Directions","volume":"9","author":"Li Y.","year":"2020","journal-title":"Journal of Cloud Computing"},{"volume-title":"Cost of a Data Breach Report 2021","year":"2021","author":"IBM","key":"e_1_2_11_131_1"},{"key":"e_1_2_11_132_1","unstructured":"S.Khandelwal \u201cCapital One Data Breach Affects 100 Million; Woman Arrested as Suspect \u201dThe Hacker News July 30 2019 https:\/\/thehackernews.com\/2019\/07\/capital\u2010one\u2010data\u2010breach.html."},{"key":"e_1_2_11_133_1","unstructured":"Microsoft Security Response Center \u201cUpdate on the Vulnerability in the Azure Cosmos DB Jupyter Notebook Feature \u201dMicrosoft August 27 2021 https:\/\/msrc.microsoft.com\/blog\/2021\/08\/update\u2010on\u2010vulnerability\u2010in\u2010the\u2010azure\u2010cosmos\u2010db\u2010jupyter\u2010notebook\u2010feature\/."},{"key":"e_1_2_11_134_1","unstructured":"E.NewcomerandC.Metz \u201cUber Paid Hackers to Delete Stolen Data on 57 Million People \u201dBloomberg November 21 2017 https:\/\/www.bloomberg.com\/news\/articles\/2017\u201011\u201021\/uber\u2010concealed\u2010cyberattack\u2010that\u2010exposed\u201057\u2010million\u2010people\u2010s\u2010data."},{"key":"e_1_2_11_135_1","unstructured":"M.Mimoso \u201cHacker Puts Hosting Service Code Spaces out of Business \u201dThreatpost June 19 2014 https:\/\/threatpost.com\/hacker\u2010puts\u2010hosting\u2010service\u2010code\u2010spaces\u2010out\u2010of\u2010business\/106761."},{"key":"e_1_2_11_136_1","unstructured":"W.TurtonandJ.Robertson \u201cHackers Access Security Camera Data From Tesla Jails and More \u201d2021Bloomberg March 9 2021 https:\/\/www.bloomberg.com\/news\/articles\/2021\u201003\u201009\/hackers\u2010expose\u2010tesla\u2010jails\u2010in\u2010breach\u2010of\u2010150\u2010000\u2010security\u2010cams."},{"key":"e_1_2_11_137_1","unstructured":"Microsoft Security Team \u201cMitigating a Record\u2010Breaking 2.4 Tbps DDoS Attack on Azure \u201dMicrosoft Security Blog September 2021 https:\/\/www.microsoft.com\/security\/blog."},{"key":"e_1_2_11_138_1","first-page":"1","article-title":"Fair Information Practices: A Basic History","volume":"24","author":"Gellman R.","year":"2017","journal-title":"Privacy Rights Clearinghouse"},{"key":"e_1_2_11_139_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6309-2"},{"key":"e_1_2_11_140_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3098480"},{"volume-title":"Zero Trust Security Model for Cloud Environments","year":"2022","author":"Microsoft","key":"e_1_2_11_141_1"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.70393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T09:07:55Z","timestamp":1765012075000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.70393"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,30]]},"references-count":140,"journal-issue":{"issue":"27-28","published-print":{"date-parts":[[2025,12,25]]}},"alternative-id":["10.1002\/cpe.70393"],"URL":"https:\/\/doi.org\/10.1002\/cpe.70393","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"type":"print","value":"1532-0626"},{"type":"electronic","value":"1532-0634"}],"subject":[],"published":{"date-parts":[[2025,10,30]]},"assertion":[{"value":"2024-07-04","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-13","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70393"}}