{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:13:05Z","timestamp":1775470385359,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T00:00:00Z","timestamp":1648425600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T00:00:00Z","timestamp":1648425600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,3,28]]},"DOI":"10.1109\/ciot53061.2022.9766571","type":"proceedings-article","created":{"date-parts":[[2022,5,9]],"date-time":"2022-05-09T20:07:05Z","timestamp":1652126825000},"page":"166-172","source":"Crossref","is-referenced-by-count":16,"title":["Cloud Computing Security and Challenges: Issues, Threats, and Solutions"],"prefix":"10.1109","author":[{"given":"Sadeem Hamad","family":"Alrasheed","sequence":"first","affiliation":[{"name":"College of Computer, Qassim University,Department of information Technology,Buraydah,KSA"}]},{"given":"Majid","family":"Aied alhariri","sequence":"additional","affiliation":[{"name":"College of Computer, Qassim University,Department of information Technology,Buraydah,KSA"}]},{"given":"Sulaiman Abdulaziz","family":"Adubaykhi","sequence":"additional","affiliation":[{"name":"College of Computer, Qassim University,Department of information Technology,Buraydah,KSA"}]},{"given":"Salim","family":"El Khediri","sequence":"additional","affiliation":[{"name":"College of Computer, Qassim University,Department of information Technology,Buraydah,KSA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CSC.2011.6138530"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2017.37"},{"key":"ref33","article-title":"Scheduler vulnerabilities and coordinated attacks in cloud computing","author":"fangfei","year":"2011","journal-title":"Network Computing and Applications (NCA) 2011 10th IEEE International Symposium on"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/computers3010001"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1186\/1869-0238-4-5"},{"key":"ref30","first-page":"62","author":"ramanathan","year":"2011","journal-title":"Comparison of cloud database Amazon's SimpleDB and Google's Bigtable International Journal of Computer Science"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2017.37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.01.006"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.60"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081075"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/sym13030484"},{"key":"ref11","first-page":"791","article-title":"Cloud Computing Security using Blockchain","volume":"6","author":"ashok","year":"2019","journal-title":"JETIR6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-020-00115-0"},{"key":"ref13","article-title":"Cloud Computing - Is it Really All That Beneficial? Advantages and Disadvantages of cloud computing","author":"viswanathan","year":"2021","journal-title":"Siliconindia"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4812"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0208-7"},{"key":"ref16","volume":"3","year":"2019","journal-title":"Cloud Security Alliance Security Guidance for Critical Areas of Focus in Cloud Computing"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38586-5_1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16120-9_9"},{"key":"ref19","first-page":"355","article-title":"Enabling Security in Cloud Storage SLAs with CloudProof","volume":"242","author":"popa","year":"0","journal-title":"USENIX Annual Technical Conference"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT-144147971.2020.9213827"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145"},{"key":"ref3","author":"rittinghouse","year":"2009","journal-title":"Cloud Computing Implementation Management and Security"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.386"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CAIS.2019.8769560"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CAIS.2019.8769504"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/160\/1\/012106"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03213-1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT52419.2022.9711640"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2022.2031841"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.47893\/IJCCT.2017.1393"},{"key":"ref1","volume":"7","author":"mell","year":"2009","journal-title":"The NIST Definition of Cloud Computing"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.21236\/ADA545053"},{"key":"ref22","article-title":"An analysis of security and privacy issues, challenges with possible solution in cloud computing","author":"kumar","year":"0","journal-title":"National Conference on Computational and Mathematical Sciences (COMPUTATIA-IV)"},{"key":"ref21","first-page":"1","article-title":"An analysis of security and privacy issues, Challenges with possible solution in cloud computing","author":"jangir","year":"0","journal-title":"Proc of the National Conf on Computational and Mathematical Sciences (COMPUTATIA-IV)"},{"key":"ref24","first-page":"487","article-title":"A framework for secure cloud computing","volume":"9","author":"youssef","year":"2012","journal-title":"International Journal of Computer Science issues (IJCSI)"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"5","DOI":"10.9756\/BIJSESC.9012","article-title":"A study of data storage security issues in cloud computing","volume":"9","author":"malathi","year":"2019","journal-title":"Bonfring International Journal of Software Engineering and Soft Computing"},{"key":"ref26","first-page":"25","article-title":"An intrusion detection and prevention system in cloud computing: A systematic review","volume":"36 1","author":"ahmed","year":"2013","journal-title":"Journal of Network and Computer Applications"},{"key":"ref25","first-page":"93","article-title":"The insider threat in cloud computing","author":"kandias","year":"2011","journal-title":"International Workshop on Critical Information Infrastructures Security"}],"event":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","location":"Marrakech, Morocco","start":{"date-parts":[[2022,3,28]]},"end":{"date-parts":[[2022,3,30]]}},"container-title":["2022 5th Conference on Cloud and Internet of Things (CIoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9766426\/9766387\/09766571.pdf?arnumber=9766571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T20:44:24Z","timestamp":1655239464000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9766571\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,28]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/ciot53061.2022.9766571","relation":{},"subject":[],"published":{"date-parts":[[2022,3,28]]}}}