{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:34:49Z","timestamp":1771468489741,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,14]]},"DOI":"10.1109\/ic3i59117.2023.10398097","type":"proceedings-article","created":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T18:27:08Z","timestamp":1706293628000},"page":"622-627","source":"Crossref","is-referenced-by-count":3,"title":["Comprehensive Analysis of Cloud Security: Issues &amp; Challenges"],"prefix":"10.1109","author":[{"given":"Shubham","family":"Kumar","sequence":"first","affiliation":[{"name":"Babasaheb Bhimrao Ambedkar University,Dept. of Information Technology,Lucknow,India"}]},{"given":"Anuj","family":"Kumar","sequence":"additional","affiliation":[{"name":"Babasaheb Bhimrao Ambedkar University,Dept. of Information Technology,Lucknow,India"}]},{"given":"Satish","family":"Kumar","sequence":"additional","affiliation":[{"name":"Babasaheb Bhimrao Ambedkar University,Dept. of Information Technology,Lucknow,India"}]},{"given":"Pawan Kumar","family":"Chaurasia","sequence":"additional","affiliation":[{"name":"Babasaheb Bhimrao Ambedkar University,Dept. of Information Technology,Lucknow,India"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"State of the cloud report","author":"Barbara","year":"2015"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00012-X"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17950\/ijer\/v3s4\/408"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICNGCIS.2017.9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/190903"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5220\/0006308703150324"},{"key":"ref7","author":"Krishnan","year":"2017","journal-title":"Security and Privacy in Cloud Computing"},{"key":"ref8","first-page":"3","article-title":"Cloud Computing Basics","volume":"1","author":"Srinivas","year":"2011","journal-title":"Build. Infrastruct. Cloud Secure."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WICT.2011.6141247"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITechn.2011.6164819"},{"issue":"4","key":"ref11","first-page":"2672","article-title":"Security issues in cloud computing and countermeasures","volume":"3","author":"Jamil","year":"2011","journal-title":"International Journal of Engineering Science and Technology (IJEST)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.500-292"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2020.0110717"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.027"},{"key":"ref16","article-title":"Top threats to cloud computing v l.0","author":"Alliance","year":"2010","journal-title":"White Paper, 23"},{"issue":"10","key":"ref17","article-title":"The security of transforming digital medical images using rdwt, ht, and svd techniques","volume":"54","author":"Yadav","year":"2022","journal-title":"Journal of Harbin institute of technology"},{"issue":"2","key":"ref18","article-title":"Microsoft Azures Leading Edge in Cloud Computing Services","volume":"16","author":"Hassan","year":"2022","journal-title":"IUP Journal of Computer Sciences"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.22214\/ijraset.2022.39802"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2010.5610668"},{"key":"ref21","article-title":"Cloud services from a consumer perspective","author":"Koehler","year":"2010","journal-title":"AIS"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2506164.2506167"},{"key":"ref23","article-title":"Cloud services from a consumer perspective","author":"Koehler","year":"2010","journal-title":"AIS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12652-4_2"}],"event":{"name":"2023 6th International Conference on Contemporary Computing and Informatics (IC3I)","location":"Gautam Buddha Nagar, India","start":{"date-parts":[[2023,9,14]]},"end":{"date-parts":[[2023,9,16]]}},"container-title":["2023 6th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10397581\/10397594\/10398097.pdf?arnumber=10398097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T18:25:24Z","timestamp":1706898324000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10398097\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,14]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ic3i59117.2023.10398097","relation":{},"subject":[],"published":{"date-parts":[[2023,9,14]]}}}