{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:18:10Z","timestamp":1758266290660,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905253","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Security, Privacy Issues and challenges In Cloud Computing"],"prefix":"10.1145","author":[{"given":"Lahar Singh","family":"Nishad","sequence":"first","affiliation":[{"name":"Computer Science &amp; Engineering, Jayoti Vidyapeeth Women's University, Jaipur, Rajasthan, India"}]},{"family":"Akriti","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering, Jayoti Vidyapeeth Women's University, Jaipur, Rajasthan, India"}]},{"given":"Jaya","family":"Paliwal","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering, Jayoti Vidyapeeth Women's University, Jaipur, Rajasthan, India"}]},{"given":"Roli","family":"Pandey","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering, Jayoti Vidyapeeth Women's University, Jaipur, Rajasthan, India"}]},{"given":"Sumitra","family":"Beniwal","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering, Jayoti Vidyapeeth Women's University, Jaipur, Rajasthan, India"}]},{"given":"Sarvesh","family":"Kumar","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering, Jayoti Vidyapeeth Women's University, Jaipur, Rajasthan, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"version 15","author":"Mell P.","year":"2009","unstructured":"P. Mell , T. Grance , \" The NIST Definition of Cloud Computing\" , version 15 , National Institute of Standards and Technology , October 7, 2009 , http:\/\/csrc.nist.gov\/groups\/SNS\/cloud-computing. P. Mell, T. Grance, \"The NIST Definition of Cloud Computing\", version 15, National Institute of Standards and Technology, October 7, 2009, http:\/\/csrc.nist.gov\/groups\/SNS\/cloud-computing."},{"volume-title":"The 2nd Cloud computing opinion poll, (in Japanese),http:\/\/cloud.manabing.jp\/cloud-news\/ing7048.html","key":"e_1_3_2_1_2_1","unstructured":"Manabi-ing , The 2nd Cloud computing opinion poll, (in Japanese),http:\/\/cloud.manabing.jp\/cloud-news\/ing7048.html . Manabi-ing, The 2nd Cloud computing opinion poll, (in Japanese),http:\/\/cloud.manabing.jp\/cloud-news\/ing7048.html."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.66"},{"key":"e_1_3_2_1_4_1","unstructured":"AmandeepVerma and SakshiKaushal \"Cloud Computing Security Issues and Challenges: A Survey\".  AmandeepVerma and SakshiKaushal \"Cloud Computing Security Issues and Challenges: A Survey\"."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.60"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.16"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774176"},{"key":"e_1_3_2_1_8_1","unstructured":"RituikDubey et al. \"Addressing Security issues in Cloud Computing\" http:\/\/www.contrib.andrew.cmu.edu\/~rdubey\/index_files\/cloud%20computing.pdf  RituikDubey et al. \"Addressing Security issues in Cloud Computing\" http:\/\/www.contrib.andrew.cmu.edu\/~rdubey\/index_files\/cloud%20computing.pdf"},{"key":"e_1_3_2_1_9_1","unstructured":"M. Okuhara et al. \"Security Architecture for Cloud Computing\" www.fujitsu.com\/downloads\/MAG\/vol46-4\/paper09.pdf  M. Okuhara et al. \"Security Architecture for Cloud Computing\" www.fujitsu.com\/downloads\/MAG\/vol46-4\/paper09.pdf"},{"key":"e_1_3_2_1_10_1","unstructured":"\"A Security Analysis of Cloud Computing\" http:\/\/cloudcomputing.syscon.com\/node\/1203943  \"A Security Analysis of Cloud Computing\" http:\/\/cloudcomputing.syscon.com\/node\/1203943"},{"key":"e_1_3_2_1_11_1","unstructured":"\"Cloud Security Questions? Here are some answers\" http:\/\/cloudcomputing.sys-con.com\/node\/1330353  \"Cloud Security Questions? Here are some answers\" http:\/\/cloudcomputing.sys-con.com\/node\/1330353"},{"key":"e_1_3_2_1_12_1","unstructured":"\"Cloud Computing and Security --A Natural Match\" Trusted Computing Group(TCG) http:\/\/www.trustedcomputinggroup.org  \"Cloud Computing and Security --A Natural Match\" Trusted Computing Group(TCG) http:\/\/www.trustedcomputinggroup.org"},{"key":"e_1_3_2_1_13_1","unstructured":"\"Controlling Data in the Cloud: Outsourcing Computation without outsourcing Control\" http:\/\/www.parc.com\/content\/attachments\/ControllingDataInTheCloud-CCSW-09.pdf  \"Controlling Data in the Cloud: Outsourcing Computation without outsourcing Control\" http:\/\/www.parc.com\/content\/attachments\/ControllingDataInTheCloud-CCSW-09.pdf"},{"key":"e_1_3_2_1_14_1","unstructured":"\"Amazon Web services: Overview of Security processes \"September 2008 http:\/\/aws.amazon.com  \"Amazon Web services: Overview of Security processes \"September 2008 http:\/\/aws.amazon.com"},{"key":"e_1_3_2_1_15_1","unstructured":"AlokTripathi Abhinav Mishra \"Cloud Computing Security Considerations\"  AlokTripathi Abhinav Mishra \"Cloud Computing Security Considerations\""},{"key":"e_1_3_2_1_16_1","unstructured":"www.researchgate.net\/publication\/259072387_Cloud_Computing_Security_Issues_And_Challenges  www.researchgate.net\/publication\/259072387_Cloud_Computing_Security_Issues_And_Challenges"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.60"},{"key":"e_1_3_2_1_18_1","first-page":"11","article-title":"A quantitative analysis of current security concerns and solutions for cloud computing","volume":"2012","author":"Gonzalez Nelson","unstructured":"Nelson Gonzalez , Charles Miers , Fernando Redigolo , Marcos Simplicio , TerezaCarvalho, Mats Naslund and MakanPourzandi , \" A quantitative analysis of current security concerns and solutions for cloud computing \", Gonzalez er al. Journal of Cloud Computing: Advances, Systems and Application 2012 , 1: 11 . Nelson Gonzalez, Charles Miers, Fernando Redigolo, Marcos Simplicio, TerezaCarvalho, Mats Naslund and MakanPourzandi, \"A quantitative analysis of current security concerns and solutions for cloud computing\", Gonzalez er al. Journal of Cloud Computing: Advances, Systems and Application 2012, 1:11.","journal-title":"Journal of Cloud Computing: Advances, Systems and Application"},{"key":"e_1_3_2_1_19_1","unstructured":"Michael Factor David Hadas AnerHamama NadavHar'el Elliot K. Kolodner AnilKurmusy Alexandra Shulman-Peleg Alessandro Sorniottiy Secure Logical Isolation for Multi-tenancy in Cloud Storage.  Michael Factor David Hadas AnerHamama NadavHar'el Elliot K. Kolodner AnilKurmusy Alexandra Shulman-Peleg Alessandro Sorniottiy Secure Logical Isolation for Multi-tenancy in Cloud Storage."},{"key":"e_1_3_2_1_20_1","unstructured":"http:\/\/www.forbes.com\/sites\/louiscolumbus\/2014\/12\/26\/kpmgs-2014-cloud-computing-survey-enterprises-quickly-moving-beyond-cost-reduction-to-customer-driven-results\/  http:\/\/www.forbes.com\/sites\/louiscolumbus\/2014\/12\/26\/kpmgs-2014-cloud-computing-survey-enterprises-quickly-moving-beyond-cost-reduction-to-customer-driven-results\/"},{"key":"e_1_3_2_1_21_1","unstructured":"RohitBhadauria SugataSanyal \"Survey on Security Issues in Cloud Computing andAssociated Mitigation Techniques\".  RohitBhadauria SugataSanyal \"Survey on Security Issues in Cloud Computing andAssociated Mitigation Techniques\"."},{"key":"e_1_3_2_1_22_1","unstructured":"Alessandro Perilli Claudio Criscione \"Securing thePrivate Cloud\" Article on Secure Networks Virtualization.info. http:\/\/virtualization.info\/en\/security\/privatecloud.pdf.  Alessandro Perilli Claudio Criscione \"Securing thePrivate Cloud\" Article on Secure Networks Virtualization.info. http:\/\/virtualization.info\/en\/security\/privatecloud.pdf."},{"key":"e_1_3_2_1_23_1","first-page":"208 0871","volume-title":"Proceedings of the 5th IEEEInternational Conference on Digital Ecosystems and Technologies (DEST)","author":"Mathisen E.","year":"2011","unstructured":"E. Mathisen , \" Security Challenges and Solutions in Cloud Computing\" , Proceedings of the 5th IEEEInternational Conference on Digital Ecosystems and Technologies (DEST) , pp. 208 -- 212 , June , 2011 , ISBN:978-1-4577- 0871 - 0878 . E. Mathisen, \"Security Challenges and Solutions inCloud Computing\", Proceedings of the 5th IEEEInternational Conference on Digital Ecosystems and Technologies (DEST), pp. 208--212, June, 2011, ISBN:978-1-4577-0871-8."},{"volume-title":"Proceedings of HighPerformance Architecture and Grid Computing","author":"Sharma P.","key":"e_1_3_2_1_24_1","unstructured":"P. Sharma , S. K. Sood , and S. Kaur , \" Security Issuesin Cloud Computing \", Proceedings of HighPerformance Architecture and Grid Computing , P. Sharma, S. K. Sood, and S. Kaur, \"Security Issuesin Cloud Computing\", Proceedings of HighPerformance Architecture and Grid Computing,"},{"volume-title":"Proceedings ofAdvances in Computing and Communications.","author":"Verma A.","key":"e_1_3_2_1_25_1","unstructured":"A. Verma and S. Kaushal , \" Cloud Computing Security Issues and Challenges: A Survey \", Proceedings ofAdvances in Computing and Communications. A. Verma and S. Kaushal, \"Cloud Computing Security Issues and Challenges: A Survey\", Proceedings ofAdvances in Computing and Communications."},{"key":"e_1_3_2_1_26_1","volume-title":"Risks and Recommendations for InformationSecurity","author":"Catteddu Daniele","year":"2009","unstructured":"Daniele Catteddu , Giles Hogben , \" Cloud Computing: Benefits , Risks and Recommendations for InformationSecurity \", European Network and InformationSecurity Agency (ENISA) , Nov , 2009 . http:\/\/www.enisa.europa.eu\/act\/applicationsecurity\/test\/act\/rm\/files\/deliverables\/cloudcomputing-risk-assessment. Daniele Catteddu, Giles Hogben, \"Cloud Computing:Benefits, Risks and Recommendations for InformationSecurity\", European Network and InformationSecurity Agency (ENISA), Nov, 2009. http:\/\/www.enisa.europa.eu\/act\/applicationsecurity\/test\/act\/rm\/files\/deliverables\/cloudcomputing-risk-assessment."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2009.84"},{"key":"e_1_3_2_1_28_1","first-page":"978","article-title":"Cloud Security and Privacy: An Enterprise Edition onRisks and Compliance (Theory in Practice)","author":"Mather Tim","year":"2009","unstructured":"Tim Mather , SubraKumaraswamy, ShahedLatif ,\" Cloud Security and Privacy: An Enterprise Edition onRisks and Compliance (Theory in Practice) \", O'ReillyMedia , Sep. 2009 ; ISBN: 978 - 0596802769 . http:\/\/oreilly.com\/catalog\/9780596802776. Tim Mather, SubraKumaraswamy, ShahedLatif,\"Cloud Security and Privacy: An Enterprise Edition onRisks and Compliance (Theory in Practice)\", O'ReillyMedia, Sep. 2009; ISBN: 978-0596802769. http:\/\/oreilly.com\/catalog\/9780596802776.","journal-title":"O'ReillyMedia"},{"key":"e_1_3_2_1_29_1","first-page":"137","article-title":"Cloud Computing: A Perspective Study","author":"Wang L.","year":"2008","unstructured":"L. Wang , GregorLaszewski, Marcel Kunze , JieTao ,\" Cloud Computing: A Perspective Study \", NewGeneration Computing-Advances of DistributedInformation Processing , pp. 137 -- 146 , vol. 28, no. 2, 2008 . L. Wang, GregorLaszewski, Marcel Kunze, JieTao,\"Cloud Computing: A Perspective Study\", NewGeneration Computing-Advances of DistributedInformation Processing, pp. 137--146, vol. 28, no. 2, 2008.","journal-title":"NewGeneration Computing-Advances of DistributedInformation Processing"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555271.1555275"},{"issue":"1","key":"e_1_3_2_1_31_1","first-page":"60","article-title":"Cloud computing:A study of infrastructure as a service (IAAS)","volume":"2","author":"Bhardwaj S.","year":"2010","unstructured":"S. Bhardwaj , L. Jain , and S. Jain , \" Cloud computing:A study of infrastructure as a service (IAAS) \", International Journal of engineering and informationTechnology , 2 ( 1 ): 60 -- 63 , 2010 . S. Bhardwaj, L. Jain, and S. Jain, \"Cloud computing:A study of infrastructure as a service (IAAS)\",International Journal of engineering and informationTechnology, 2(1):60--63, 2010.","journal-title":"International Journal of engineering and informationTechnology"},{"key":"e_1_3_2_1_32_1","volume-title":"The WorldPrivacy Forum","author":"Gellman R.","year":"2009","unstructured":"R. Gellman , \"Privacy in the clouds: Risks to privacyand confidentiality from cloud computing \", The WorldPrivacy Forum , 2009 . http:\/\/www.worldprivacyforum.org\/pdf\/WPF_Cloud_Privacy_Report.pdf. R. Gellman, \"Privacy in the clouds: Risks to privacyand confidentiality from cloud computing\", The WorldPrivacy Forum, 2009. http:\/\/www.worldprivacyforum.org\/pdf\/WPF_Cloud_Privacy_Report.pdf."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2010.514654"},{"key":"e_1_3_2_1_34_1","first-page":"1 3875","volume-title":"17th International workshop on Quality of Service, 2009","author":"Wang Cong","year":"2009","unstructured":"Cong Wang , Qian Wang , KuiRen, and WenjingLou,\" Ensuring Data Storage Security in CloudComputing\" , 17th International workshop on Quality of Service, 2009 , IWQoS, Charleston, SC, USA , pp. 1 -- 9 , July 13-15, 2009 , ISBN: 978-1-4244- 3875 - 3874 . Cong Wang, Qian Wang, KuiRen, and WenjingLou,\"Ensuring Data Storage Security in CloudComputing\", 17th International workshop on Quality of Service, 2009, IWQoS, Charleston, SC, USA, pp. 1--9, July 13-15, 2009, ISBN: 978-1-4244-3875-4."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"e_1_3_2_1_36_1","unstructured":"Char Sample Senior Scientist BBN Technologies Diana Kelley Partner Security Curve \"Cloudcomputing security: Routing and DNS securitythreats\". http:\/\/searchsecurity.techtarget.com\/tip\/0 289483 sid14_gci1359155_meml 00.html\/  Char Sample Senior Scientist BBN Technologies Diana Kelley Partner Security Curve \"Cloudcomputing security: Routing and DNS securitythreats\". http:\/\/searchsecurity.techtarget.com\/tip\/0 289483 sid14_gci1359155_meml 00.html\/"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905253","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:46Z","timestamp":1750221526000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905253"}},"subtitle":["A Survey"],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":36,"alternative-id":["10.1145\/2905055.2905253","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905253","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}