{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T19:06:51Z","timestamp":1775070411291,"version":"3.50.1"},"reference-count":76,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T00:00:00Z","timestamp":1738195200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T00:00:00Z","timestamp":1738195200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s13198-025-02705-8","type":"journal-article","created":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T05:05:19Z","timestamp":1738213519000},"page":"1287-1300","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Cloud computing security assurance modelling through risk analysis using machine learning"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6848-1603","authenticated-orcid":false,"given":"Abhishek","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Umesh Kumar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,30]]},"reference":[{"key":"2705_CR1","first-page":"88","volume-title":"Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking Computers & Security","author":"IT Abdulaziz Aldribi","year":"2020","unstructured":"Abdulaziz Aldribi IT, Belaid Moa ON (2020) Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking Computers & Security. Elsevier, p 88"},{"key":"2705_CR2","doi-asserted-by":"publisher","unstructured":"Abrar I, Ayub Z, Masoodi F, &Bamhdi AM (2020). A machine learning approach for intrusion detection system on NSL-KDD dataset. Proceedings of the\u2014International Conference on Smart Electronics and Communication, ICOSEC 2020 (pp. 919\u2013924). https:\/\/doi.org\/10.1109\/ICOSEC49089.2020.9215232","DOI":"10.1109\/ICOSEC49089.2020.9215232"},{"key":"2705_CR3","doi-asserted-by":"publisher","unstructured":"Aldribi A, Traore I, & Moa B. (2018). Data sources and datasets for cloud intrusion detection modeling and evaluation. Studies in Big Data, 333\u2013366. https:\/\/doi.org\/10.1007\/978-3-319-73676-1_13. Mishra B, Das H, Dehuri S, &Jagadev A. Cloud computing for optimization: Foundations, applications, and challenges. Studies in Big Data, 39: 333\u2013366. Springer.","DOI":"10.1007\/978-3-319-73676-1_13"},{"key":"2705_CR4","doi-asserted-by":"crossref","unstructured":"Alejandre FV, Cort\u00e9s NC, & Anaya EA (2017). Feature selection to detect botnets using machine learning algorithms. In Electronics, communications and computers (CONIELECOMP) International Conference on, 2017 (pp. 1\u20137).","DOI":"10.1109\/CONIELECOMP.2017.7891834"},{"issue":"19","key":"2705_CR5","doi-asserted-by":"publisher","first-page":"3007","DOI":"10.3390\/electronics11193007","volume":"11","author":"OA Alzubi","year":"2022","unstructured":"Alzubi OA, Alzubi JA, Alazab M, Alrabea A, Awajan A, Qiqieh I (2022a) Optimized machine learning-based intrusion detection system for fog and edge computing environment. Electronics 11(19):3007. https:\/\/doi.org\/10.3390\/electronics11193007","journal-title":"Electronics"},{"key":"2705_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03686-0","author":"OA Alzubi","year":"2022","unstructured":"Alzubi OA, Qiqieh I, Alzubi JA (2022) Fusion of deep learning based cyberattack detection and classification model for intelligent systems. Cluster Comput J. https:\/\/doi.org\/10.1007\/s10586-022-03686-0","journal-title":"Cluster Comput J"},{"issue":"1","key":"2705_CR7","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1109\/TII.2022.3189170","volume":"19","author":"JA Alzubi","year":"2023","unstructured":"Alzubi JA, Alzubi OA, Singh A, Ramachandran M (2023) Cloud-IIoT-based electronic health record privacy-preserving by CNN and blockchain-enabled federated learning. IEEE Trans Industr Inf 19(1):1080\u20131087. https:\/\/doi.org\/10.1109\/TII.2022.3189170","journal-title":"IEEE Trans Industr Inf"},{"key":"2705_CR8","doi-asserted-by":"crossref","unstructured":"Bakshi A, &Dujodwala YB (2010). Securing cloud from ddos attacks using intrusion detection system in virtual machine. In Communication Software and Networks. ICCSN\u201910. Second International Conference on, 2010 (pp. 260\u2013264).","DOI":"10.1109\/ICCSN.2010.56"},{"issue":"2","key":"2705_CR9","doi-asserted-by":"publisher","first-page":"664","DOI":"10.12928\/telkomnika.v19i2.18325","volume":"19","author":"AM Bamhdi","year":"2021","unstructured":"Bamhdi AM, Abrar I, Masoodi F (2021) An ensemble based approach for effective intrusion detection using majority voting. TELKOMNIKA (Telecommun Comput Electron Control) 19(2):664. https:\/\/doi.org\/10.12928\/telkomnika.v19i2.18325","journal-title":"TELKOMNIKA (Telecommun Comput Electron Control)"},{"key":"2705_CR10","doi-asserted-by":"crossref","unstructured":"Basu, S. et al. (2018). Cloud computing security challenges and solutions-a survey, in 2018 IEEE8th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 347\u2013356).","DOI":"10.1109\/CCWC.2018.8301700"},{"issue":"1","key":"2705_CR11","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MIC.2017.1","volume":"21","author":"D Bermbach","year":"2017","unstructured":"Bermbach D (2017) Quality of cloud services: expect the unexpected. IEEE Internet Comput 21(1):68\u201372. https:\/\/doi.org\/10.1109\/MIC.2017.1","journal-title":"IEEE Internet Comput"},{"issue":"18","key":"2705_CR12","doi-asserted-by":"publisher","first-page":"47","DOI":"10.5120\/7292-0578","volume":"47","author":"R Bhadauria","year":"2012","unstructured":"Bhadauria R, Sanyal S (2012) Survey on security issues in cloud computing and associated mitigation techniques. Int J Comput Appl 47(18):47\u201366. https:\/\/doi.org\/10.5120\/7292-0578","journal-title":"Int J Comput Appl"},{"key":"2705_CR13","volume-title":"Cloud computing: Principles and paradigms, 87","author":"R Buyya","year":"2010","unstructured":"Buyya R, Broberg J, Goscinski AM (2010) Cloud computing: Principles and paradigms, 87. John Wiley & Sons"},{"issue":"1","key":"2705_CR14","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MSP.2009.12","volume":"7","author":"F Callegati","year":"2009","unstructured":"Callegati F, Cerroni W, Ramilli M (2009) Man-in-theMiddle attack to the HTTPS protocol. IEEE Secur Priv 7(1):78\u201381","journal-title":"IEEE Secur Priv"},{"issue":"1","key":"2705_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-016-0071-y","volume":"6","author":"X Chen","year":"2017","unstructured":"Chen X, Chen S, Zeng X, Zheng X, Zhang Y, Rong C (2017) Framework for context-aware computation offloading in mobile cloud computing. J Cloud Comput 6(1):1. https:\/\/doi.org\/10.1186\/s13677-016-0071-y","journal-title":"J Cloud Comput"},{"key":"2705_CR16","doi-asserted-by":"crossref","unstructured":"Chen Y, Li X, & Chen F (2011). Overview and analysis of cloud computing research and application. In Ebusiness and E-government (ICEE) International Conference on, 2011 (pp. 1\u20134).","DOI":"10.1109\/ICEBEG.2011.5881819"},{"key":"2705_CR17","doi-asserted-by":"publisher","unstructured":"Chen L, Xian M, Liu J, & Wang H (2020). Intrusion detection system in cloud computing environmentInternational Conference on Computer Communication and Network Security (CCNS), 2020 (pp. 131\u2013135). https:\/\/doi.org\/10.1109\/CCNS50731.2020.00037","DOI":"10.1109\/CCNS50731.2020.00037"},{"key":"2705_CR18","volume-title":"SQL injection attacks and defense","author":"J Clarke-Salt","year":"2009","unstructured":"Clarke-Salt J (2009) SQL injection attacks and defense. Elsevier"},{"key":"2705_CR19","doi-asserted-by":"crossref","unstructured":"Dantas YG, Nigam V, & Fonseca IE (2014). A selective defense for application layer ddos attacks. In IEEE joint intelligence and security informatics conference, 2014 (pp. 75\u201382). IEEE Publications.","DOI":"10.1109\/JISIC.2014.21"},{"issue":"3","key":"2705_CR20","doi-asserted-by":"publisher","first-page":"131","DOI":"10.3233\/IDA-1997-1302","volume":"1","author":"M Dash","year":"1997","unstructured":"Dash M, Liu H (1997) Feature selection for classification. Intell Data Anal 1(3):131\u2013156. https:\/\/doi.org\/10.3233\/IDA-1997-1302","journal-title":"Intell Data Anal"},{"issue":"6","key":"2705_CR21","first-page":"446","volume":"4","author":"L Dhanabal","year":"2015","unstructured":"Dhanabal L, Shantharajah SP (2015) A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int J Adv Res Comput Commun Eng 4(6):446\u2013452","journal-title":"Int J Adv Res Comput Commun Eng"},{"issue":"1","key":"2705_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2756550","volume":"18","author":"G Doychev","year":"2015","unstructured":"Doychev G, K\u00f6pf B, Mauborgne L, Reineke J (2015) Cacheaudit: a tool for the static analysis of cache side channels. ACM Trans Inf Syst Secur 18(1):1\u201332. https:\/\/doi.org\/10.1145\/2756550","journal-title":"ACM Trans Inf Syst Secur"},{"key":"2705_CR23","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-1-4615-0953-0_4","volume-title":"Applications of Data Mining in Computer Security","author":"E Eskin","year":"2002","unstructured":"Eskin E, Arnold A, Prerau M, Portnoy L, Stolfo S (2002) A geometric framework for unsupervised anomaly detection. In: Barbar\u00e1 D, Jajodia S (eds) Applications of Data Mining in Computer Security. Springer US, Boston, pp 77\u2013101. https:\/\/doi.org\/10.1007\/978-1-4615-0953-0_4"},{"issue":"1","key":"2705_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13174-014-0015-z","volume":"6","author":"N Fotiou","year":"2015","unstructured":"Fotiou N, Machas A, Polyzos GC, Xylomenos G (2015) Access control as a service for the Cloud. J Int Serv Appl 6(1):1\u201315","journal-title":"J Int Serv Appl"},{"key":"2705_CR25","doi-asserted-by":"publisher","first-page":"85123","DOI":"10.1109\/ACCESS.2019.2920879","volume":"7","author":"M Gheisari","year":"2019","unstructured":"Gheisari M et al (2019) An optimization model for software quality prediction with case study analysis using MATLAB. IEEE Access 7:85123\u201385138. https:\/\/doi.org\/10.1109\/ACCESS.2019.2920879","journal-title":"IEEE Access"},{"key":"2705_CR26","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-81-322-2250-7_10","volume":"10","author":"P Ghosh","year":"2015","unstructured":"Ghosh P, Mandal AK, Kumar R (2015) An efficient cloud network intrusion detection system. Adv Intell Syst Comput 10:91\u201399. https:\/\/doi.org\/10.1007\/978-81-322-2250-7_10","journal-title":"Adv Intell Syst Comput"},{"key":"2705_CR27","doi-asserted-by":"crossref","unstructured":"Gill, S. S. et al. (2019). Transformative effects of IoT, Blockchain and Artificial Intelligence on cloud computing: Evolution, vision, trends and open challenges, Internet of Things, pp. 100118.","DOI":"10.1016\/j.iot.2019.100118"},{"issue":"1","key":"2705_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.istr.2008.02.002","volume":"13","author":"D Gollmann","year":"2008","unstructured":"Gollmann D (2008) Securing web applications. Inf Secur Tech Rep 13(1):1\u20139. https:\/\/doi.org\/10.1016\/j.istr.2008.02.002","journal-title":"Inf Secur Tech Rep"},{"key":"2705_CR29","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.procs.2018.01.095","volume":"127","author":"M Idhammad","year":"2018","unstructured":"Idhammad M, Afdel K, Belouch M (2018) Distributed intrusion detection system for cloud environments based on data mining techniques. Procedia Comput Sci 127:35\u201341. https:\/\/doi.org\/10.1016\/j.procs.2018.01.095","journal-title":"Procedia Comput Sci"},{"issue":"4","key":"2705_CR30","doi-asserted-by":"publisher","first-page":"3221","DOI":"10.1007\/s10586-020-03082-6","volume":"23","author":"AN Jaber","year":"2020","unstructured":"Jaber AN, Rehman SU (2020) FCM\u2013SVM based intrusion detection system for cloud computing environment. Clust Comput 23(4):3221\u20133231. https:\/\/doi.org\/10.1007\/s10586-020-03082-6","journal-title":"Clust Comput"},{"key":"2705_CR31","unstructured":"Jadhav SS, Hagwane PK, Labhade PC, &Nalawde KS (2016). Data confidentiality in cloud computing using android application, Imp.J. Interdiscip. Res., 2(6)."},{"issue":"2","key":"2705_CR32","doi-asserted-by":"crossref","first-page":"2969","DOI":"10.3233\/JIFS-190078","volume":"37","author":"R Jain","year":"2019","unstructured":"Jain R, Alzubi J, Jain N, Joshi P (2019) Assessing risk in life insurance using ensemble learning. J Intell Fuzzy Syst 37(2):2969\u20132980","journal-title":"J Intell Fuzzy Syst"},{"issue":"S2","key":"2705_CR33","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1007\/s13198-017-0612-x","volume":"8","author":"S Jaiswal","year":"2017","unstructured":"Jaiswal S, Gupta D (2017) Engineering and validating security to make cloud secure. Int J Syst Assur Eng and Management 8(S2):1419\u20131441. https:\/\/doi.org\/10.1007\/s13198-017-0612-x","journal-title":"Int J Syst Assur Eng and Management"},{"issue":"2","key":"2705_CR34","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1504\/IJMOR.2019.097758","volume":"14","author":"Y Kansal","year":"2019","unstructured":"Kansal Y, Kapur PK, Kumar U, Kumar D (2019) Prioritising vulnerabilities using ANP and evaluating their optimal discovery and patch release time. Int J Math Op Res 14(2):236. https:\/\/doi.org\/10.1504\/IJMOR.2019.097758","journal-title":"Int J Math Op Res"},{"issue":"15","key":"2705_CR35","doi-asserted-by":"publisher","first-page":"2908","DOI":"10.1016\/j.comnet.2008.06.012","volume":"52","author":"J Karlin","year":"2008","unstructured":"Karlin J, Forrest S, Rexford J (2008) Autonomous security for autonomous systems. Comput Netw 52(15):2908\u20132923. https:\/\/doi.org\/10.1016\/j.comnet.2008.06.012","journal-title":"Comput Netw"},{"key":"2705_CR36","doi-asserted-by":"crossref","unstructured":"Karthiban K, &Smys S (2018). Privacy preserving approaches in cloud computing, in 20182nd International Conference on Inventive Systems and Control (ICISC) (pp. 462\u2013467).","DOI":"10.1109\/ICISC.2018.8399115"},{"key":"2705_CR37","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"MA Khan","year":"2018","unstructured":"Khan MA, Salah K (2018) IoT security [Review], blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395\u2013411","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"2705_CR38","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1504\/IJWGS.2013.055724","volume":"9","author":"W Kim","year":"2013","unstructured":"Kim W (2013) Cloud computing architecture. Int J Web Grid Serv 9(3):287\u2013303. https:\/\/doi.org\/10.1504\/IJWGS.2013.055724","journal-title":"Int J Web Grid Serv"},{"key":"2705_CR39","doi-asserted-by":"crossref","unstructured":"Kourai K, Azumi T, & Chiba S. (2012). A self-protection mechanism against stepping-stone attacks for IaaS clouds. In Ubiquitous intelligence and computing and9th International Conference on Autonomic and Trusted Computing (UIC\/ATC) 9th International Conference on, 2012 (pp. 539\u2013546).","DOI":"10.1109\/UIC-ATC.2012.139"},{"key":"2705_CR40","unstructured":"Ku C-Y, & Chiu Y-S. (2013). A novel infrastructure for data sanitization in cloud computing [Research paper], in Diversity. Technology, and innovation for operational competitiveness. Proceedings of the 2013 International Conference on Technology Innovation and Industrial Management p. S3_25\u201328."},{"issue":"1","key":"2705_CR41","first-page":"14","volume":"4","author":"SN Kumar","year":"2016","unstructured":"Kumar SN, Vajpayee A (2016) A survey on secure cloud: Security and privacy in cloud computing. Am J Syst Softw 4(1):14\u201326","journal-title":"Am J Syst Softw"},{"key":"2705_CR42","doi-asserted-by":"crossref","unstructured":"Lin W, & Lee D (2012). Traceback attacks in cloud-Pebbletrace botnet. In Distributed Computing Systems Workshops (ICDCSW)32nd International Conference on, 2012 (pp. 417\u2013426).","DOI":"10.1109\/ICDCSW.2012.61"},{"key":"2705_CR43","doi-asserted-by":"crossref","unstructured":"Liu HI, & Chang KC. (2011). Defending systems against tilt DDoS attacks. In 6th International Conference on Telecommunication Systems, Services, and Applications (TSSA), 2011 (pp. 22\u201327). IEEE Publications.","DOI":"10.1109\/TSSA.2011.6095400"},{"key":"2705_CR44","doi-asserted-by":"crossref","unstructured":"Liu A, Yuan Y, Wijesekera D, &Stavrou A (2009). SQLProb: A proxy-based architecture towards preventing SQL injection attacks. In Proceedings of the 2009 ACM Symposium on Applied Computing (pp. 2054\u20132061).","DOI":"10.1145\/1529282.1529737"},{"issue":"4","key":"2705_CR45","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1016\/j.jnca.2010.06.008","volume":"34","author":"F Lombardi","year":"2011","unstructured":"Lombardi F, Di Pietro R (2011) Secure virtualization for cloud computing. J Netw Comput Appl 34(4):1113\u20131122. https:\/\/doi.org\/10.1016\/j.jnca.2010.06.008","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"2705_CR46","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MNET.2011.5958005","volume":"25","author":"R Lua","year":"2011","unstructured":"Lua R, Yow KC (2011) Mitigating ddos attacks with transparent and intelligent fast-flux swarm network. IEEE Network 25(4):28\u201333. https:\/\/doi.org\/10.1109\/MNET.2011.5958005","journal-title":"IEEE Network"},{"key":"2705_CR47","doi-asserted-by":"crossref","unstructured":"Luo S, Lin Z, Chen X, Yang, Z, & Chen J. (2011). Virtualization security for cloud computing service. In Cloud and service computing (CSC)International Conference on, 2011 (pp. 174\u2013179).","DOI":"10.1109\/CSC.2011.6138516"},{"key":"2705_CR48","unstructured":"Mather T, Kumaraswamy S, &Latif S (2009) Cloud security and privacy: An enterprise perspective on risks and compliance. O\u2018Reilly Media, 2009."},{"key":"2705_CR49","doi-asserted-by":"crossref","unstructured":"Mell, P., &Grance, T. (2011). \u2015The NIST definition of cloud computing.","DOI":"10.6028\/NIST.SP.800-145"},{"issue":"1","key":"2705_CR50","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/TR.2011.2110210","volume":"60","author":"KB Misra","year":"2011","unstructured":"Misra KB, Verma AK (2011) Special Section on reliability and risk assessment of complex systems. IEEE Trans Reliab 60(1):59\u201360. https:\/\/doi.org\/10.1109\/TR.2011.2110210","journal-title":"IEEE Trans Reliab"},{"key":"2705_CR51","doi-asserted-by":"crossref","unstructured":"Nister D, &Stewenius H (2006). Scalable recognition with a vocabulary tree. In Computer vision and pattern recognitionIEEE computer society conference on, 2 (pp. 2161\u20132168).","DOI":"10.1109\/CVPR.2006.264"},{"issue":"1","key":"2705_CR52","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2012.08.007","volume":"36","author":"A Patel","year":"2013","unstructured":"Patel A, Taghavi M, Bakhtiyari K, CelestinoJ\u00fanior J (2013) An intrusion detection and prevention system in cloud computing: a systematic review. J Netw Comput Appl 36(1):25\u201341. https:\/\/doi.org\/10.1016\/j.jnca.2012.08.007","journal-title":"J Netw Comput Appl"},{"key":"2705_CR53","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3355127","author":"M Rani","year":"2019","unstructured":"Rani M (2019) A review of intrusion detection system in cloud computing. SSRN Electron J. https:\/\/doi.org\/10.2139\/ssrn.3355127","journal-title":"SSRN Electron J"},{"key":"2705_CR54","doi-asserted-by":"crossref","unstructured":"Riquet D, Grimaud G, & Hauspie M (2012). Large-scale coordinated attacks: Impact on the cloud security. In Innovative mobile and Internet services in ubiquitous computing (IMIS)Sixth International Conference on, 2012 (pp. 558\u2013563).","DOI":"10.1109\/IMIS.2012.76"},{"key":"2705_CR55","unstructured":"Salmen F, Hernandes P, Carvalho L, &Proenca M (2015). Using firefly and genetic metaheuristics for anomaly detection based on network flows. In Proceedings of the 11th Advanced International Conference on Telecommunications (pp. 113\u2013118)."},{"issue":"2007","key":"2705_CR56","first-page":"94","volume":"800","author":"K Scarfone","year":"2007","unstructured":"Scarfone K, Mell P (2007) Guide to intrusion detection and prevention systems (idps). NIST Spec Publ 800(2007):94","journal-title":"NIST Spec Publ"},{"key":"2705_CR57","doi-asserted-by":"publisher","unstructured":"Sharma A, & Singh UK (2021a). Investigation of cloud computing security issues and challenges, 3rd International Conference on Integrated Intelligent Computing Communication and Security (ICIIC), 2021. https:\/\/doi.org\/10.2991\/ahis.k.210913.055","DOI":"10.2991\/ahis.k.210913.055"},{"key":"2705_CR58","doi-asserted-by":"publisher","unstructured":"Sharma A, & Singh UK (2021b). Deployment model of e-educational cloud for departmental academics automation using open source. HTL Journal, 27(5, 36), ISSN 1006\u20136748. https:\/\/doi.org\/10.37896\/HTL27.5\/3535","DOI":"10.37896\/HTL27.5\/3535"},{"key":"2705_CR59","unstructured":"Sharma A, Singh UK et al. (2021c). \u2018A Comparative analysis of security issues and vulnerabilities of leading Cloud Service Providers and in-house University Cloud platform for hosting E-Educational applications,\u2019 IEEE Mysore Sub Section International Conference (MysuruCon), ISBN 978\u20130\u20137381\u20134662\u20131."},{"issue":"1","key":"2705_CR61","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.gltp.2022.03.030","volume":"3","author":"A Sharma","year":"2022","unstructured":"Sharma A, Singh UK (2022) Modelling of smart risk assessment approach for cloud computing environment using AI & supervised machine learning algorithms. Global Trans Proc 3(1):243\u2013250","journal-title":"Global Trans Proc"},{"key":"2705_CR77","doi-asserted-by":"publisher","unstructured":"Sharma A, Singh UK et al. (2023) Security and Privacy aspect of Cyber-Physical Systems. In A. Baliyan\n(Ed.), Cyber Physical system: Concept and application. CRC Press Taylor & Francis Group, 1st ed.,\nChapman and Hall\/CRC. https:\/\/doi.org\/10.1201\/9781003220664-9","DOI":"10.1201\/9781003220664-9"},{"issue":"6","key":"2705_CR62","first-page":"791","volume":"6","author":"ST Siddiqui","year":"2019","unstructured":"Siddiqui ST, Alam S, Shuaib M, Gupta A (2019) Cloud computing security using blockchain. J Emerg Technol Innovative Res 6(6):791\u2013794","journal-title":"J Emerg Technol Innovative Res"},{"key":"2705_CR63","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1201\/9781003146711-3","volume-title":"Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0","author":"UK Singh","year":"2021","unstructured":"Singh UK, Sharma A (2021) Cloud Computing Security Framework Based on Shared Responsibility Models. In: Bali V, Bhatnagar V, Aggarwal D, Bali S, Div\u00e1n MJ (eds) Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0. CRC Press, Boca Raton, pp 39\u201355. https:\/\/doi.org\/10.1201\/9781003146711-3"},{"key":"2705_CR64","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1201\/9781003220664-9","volume-title":"Cyber Physical Systems: Concepts and Applications","author":"UK Singh","year":"2022","unstructured":"Singh UK, Sharma A, Singh SK, Tomar PS, Dixit K, Upreti K (2022) Security and Privacy Aspect of Cyber Physical Systems. In: Baliyan A, Kaswan KS, Kumar N, Upreti K, Kannan R (eds) Cyber Physical Systems: Concepts and Applications. Chapman and Hall\/CRC, Boca Raton, pp 141\u2013164. https:\/\/doi.org\/10.1201\/9781003220664-9"},{"key":"2705_CR65","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.comcom.2017.03.010","volume":"107","author":"G Somani","year":"2017","unstructured":"Somani G, Gaur MS, Sanghi D, Conti M, Buyya R (2017) DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Comput Commun 107:30\u201348. https:\/\/doi.org\/10.1016\/j.comcom.2017.03.010","journal-title":"Comput Commun"},{"key":"2705_CR66","unstructured":"Sridhar S, &Smys S (2016). A survey on cloud security issues and challenges with possible measures. In International Conference on Inventive Research in Engineering and Technology, 4."},{"issue":"1","key":"2705_CR67","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1\u201311. https:\/\/doi.org\/10.1016\/j.jnca.2010.07.006","journal-title":"J Netw Comput Appl"},{"key":"2705_CR68","doi-asserted-by":"crossref","unstructured":"TerLouw M, &Venkatakrishnan VN. (2009). \u2015Blueprint: Robust prevention of cross-site scripting attacks for existing browsers. In Security and Privacy30th IEEE Symposium on, 2009 (pp. 331\u2013346).","DOI":"10.1109\/SP.2009.33"},{"issue":"4","key":"2705_CR69","first-page":"38","volume":"12","author":"K Vieira","year":"2010","unstructured":"Vieira K, Schulter A, Westphall C, Westphall C (2010) Intrusion detection techniques in grid and cloud computing environment. IT Prof IEEE Comput Societ\u00e0 12(4):38\u201343","journal-title":"IT Prof IEEE Comput Societ\u00e0"},{"key":"2705_CR70","doi-asserted-by":"publisher","unstructured":"T. Vijayakumar K, Ramalakshmi C, Priyadharsini S, Vasanthakumar S, and Sharma A,(2022) Bio-Inspired Optimization Algorithm on Cloud based Image Retrieval System using Deep Features,\" 2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), Trichy, India, 2022, pp. 871\u2013876, https:\/\/doi.org\/10.1109\/ICAISS55157.2022.10010739.","DOI":"10.1109\/ICAISS55157.2022.10010739"},{"key":"2705_CR71","doi-asserted-by":"crossref","unstructured":"Vijayalakshmi M, Shalinie SM, &Pragash AA. (2012). IP traceback system for network and application layer attacks. In International Conference on Recent Trends in Information Technology, (pp. 439\u2013444). IEEE Publications.","DOI":"10.1109\/ICRTIT.2012.6206778"},{"issue":"5","key":"2705_CR72","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1016\/j.jcss.2011.12.017","volume":"78","author":"D Villegas","year":"2012","unstructured":"Villegas D, Bobroff N, Rodero I, Delgado J, Liu Y, Devarakonda A, Fong L, MasoudSadjadi S, Parashar M (2012) Cloud federation in a layered service model. J Comput Syst Sci 78(5):1330\u20131344. https:\/\/doi.org\/10.1016\/j.jcss.2011.12.017","journal-title":"J Comput Syst Sci"},{"key":"2705_CR73","doi-asserted-by":"crossref","unstructured":"Wu H, Ding Y, Winer C, & Yao L (2010). Network security for virtual machine in cloud computing. In Computer Sciences and Convergence Information Technology (ICCIT) 5th International Conference on, 2010 (pp. 18\u201321).","DOI":"10.1109\/ICCIT.2010.5711022"},{"key":"2705_CR74","doi-asserted-by":"publisher","unstructured":"Zaidi, T. (2021), A network intrusion based detection system for cloud computing environment. Preprints. https:\/\/doi.org\/10.20944\/preprints202104.0183.v1","DOI":"10.20944\/preprints202104.0183.v1"},{"issue":"4","key":"2705_CR75","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1007\/s13198-021-01068-0","volume":"12","author":"H Zhai","year":"2021","unstructured":"Zhai H, Wang J (2021) Automatic deployment system of computer program application based on cloud computing. Int J Syst Assur Eng Manag 12(4):731\u2013740. https:\/\/doi.org\/10.1007\/s13198-021-01068-0","journal-title":"Int J Syst Assur Eng Manag"},{"key":"2705_CR76","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/3379843","volume":"2022","author":"S. Priscila","year":"2022","unstructured":"Priscila S (2022) Risk-Based Access Control Mechanism for Internet of Vehicles Using Artificial Intelligence. Security and Communication Networks 2022:1-13 https:\/\/doi.org\/10.1155\/2022\/3379843","journal-title":"Security and Communication Networks"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-02705-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-025-02705-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-02705-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T03:13:46Z","timestamp":1743822826000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-025-02705-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,30]]},"references-count":76,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["2705"],"URL":"https:\/\/doi.org\/10.1007\/s13198-025-02705-8","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,30]]},"assertion":[{"value":"31 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that: The submitted work is original and is not published elsewhere in any form or language. It has not been published elsewhere and that it has not been submitted simultaneously for publication elsewhere. We have no conflicts of interest to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}