A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

Profile image of junaid hassan

Computational Intelligence and Neuroscience

Cloud computing is a long-standing dream of computing as a utility, where users can store their data remotely in the cloud to enjoy on-demand services and high-quality applications from a shared pool of configurable computing resources. Thus, the privacy and security of data are of utmost importance to all of its users regardless of the nature of the data being stored. In cloud computing environments, it is especially critical because data is stored in various locations, even around the world, and users do not have any physical access to their sensitive data. Therefore, we need certain data protection techniques to protect the sensitive data that is outsourced over the cloud. In this paper, we conduct a systematic literature review (SLR) to illustrate all the data protection techniques that protect sensitive data outsourced over cloud storage. Therefore, the main objective of this research is to synthesize, classify, and identify important studies in the field of study. Accordingly,...

Related Papers

IEEE Explore, 2022 OITS International Conference on Information Technology (OCIT)

AVIJIT MONDAL

Cloud security is a branch of cyber security that focuses on securing cloud computing systems. It is a method for enterprises to use the internet to access storage and virtual services while saving money on infrastructure, considered as the next-generation architecture since it combines application software and databases into big data centers. However, difficulties with confidentiality, protection, integrity, and compliance may surface when the information is not kept, examined, or computed locally. A wide range of data security-related topics are covered by cloud-based data security. For securing an organization’s data across the network, data encryption is a common and effective security strategy that is a great alternative. The most vulnerable data is financial and payment systems, and medical data, which can expose customers or clients critical information. Several academics have also offered a range of approaches to safeguards to maintain data privacy and security while it is being transmitted, but there are still a lot of obstacles to the safety of data that is being stored in the cloud. In this paper, several research papers that have been authored and published in this topic are thoroughly examined and analysed. This study gives a review of the literature on different methods for establishing data security in cloud environment. Index Terms—Systematic literature review, Cloud computing, Crypotgraphy, Information Security, Data Encryption, Decryption

literature review on cloud computing pdf

Computer Science & Information Technology (CS & IT) Computer Science Conference Proceedings (CSCP)

Cloud computing is revolutionizing many ecosystems by providing organizations with computing resources featuring easy deployment, connectivity, configuration, automation and scalability. This paradigm shift raises a broad range of security and privacy issues that must be taken into consideration. Multi-tenancy, loss of control, and trust are key challenges in cloud computing environments. This paper reviews the existing technologies and a wide array of both earlier and state-of-the-art projects on cloud security and privacy. We categorize the existing research according to the cloud reference architecture orchestration, resource control, physical resource, and cloud service management layers, in addition to reviewing the existing developments in privacy-preserving sensitive data approaches in cloud computing such as privacy threat modeling and privacy enhancing protocols and solutions.

Mubeen Fatima

Data storage in cloud have become a great concern today. Many encryption and decryption methods have already been proposed to secure cloud data but everything comes with its pros and cons, this paper provides a critical overview of these cryptography techniques, issues and solutions regarding its security and availability.

Jaouani Alaa

Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe. Data security and privacy protection are the two main factors of user's concerns about the cloud technology. Though many techniques on the topics in cloud computing have been investigated in both academics and industries, data security and privacy protection are becoming more important for the future development of cloud computing technology in government, industry, and business. Data security and privacy protection issues are relevant to both hardware and software in the cloud architecture. This study is to review different security techniques and challenges from both software and hardware aspects for protecting data in the cloud and aims at enhancing the data security and privacy protection for the trustworthy cloud environment. In this paper, we make a comparative research analysis of the existing research work regarding the data security and privacy protection techniques used in the cloud computing.

The Surge in Cloud Computing use and its Data Privacy and Security Measures

Oluwafemi Adedeji , Olamide Alashi , Kido Ukwamefune

The next step in the growth of the internet is cloud computing, an Internet-based technology. Although security concerns have gained a lot of attention recently, they remain a substantial barrier to the expansion of cloud computing. It simply transfers user data and application software to massive, distantly located data centers, or "cloud," over which the user has no authority and where the administration of the data may not be totally safe. However, this one aspect of cloud computing alone poses several security issues that demand attention and thorough explanation. Therefore, a literature analysis was undertaken as part of this study to look into the problems that cloud computing has faced in the past and present as well as the many data security methods that are employed there. The study found that while several early data security concerns with cloud computing have been addressed, few of them have persisted into the present, and some recently emergent concerns have also been noted. Therefore, this study recommends putting the studied advice for cloud computing data security into practice.

Zenodo (CERN European Organization for Nuclear Research)

IJDIIC IJDIIC

International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Online ISSN : 2394-4099, Print ISSN : 2395-1990, Volume 08, Issue 5, Pages 113-152

Dr. Yusuf Perwej , Nikhat Akhtar

People used to carry their documents about on CDs only a few years ago. Many people have recently turned to memory sticks. Cloud computing, in this case, refers to the capacity to access and edit data stored on remote servers from any Internet-connected platform. Cloud computing is a self-service Internet infrastructure that allows people to access computing resources at any location worldwide. The world has altered as a result of cloud computing. Cloud computing can be thought of as a new computing typology that can provide on-demand services at a low cost. By increasing the capacity and flexibility of data storage and providing scalable compute and processing power that fits the dynamic data requirements, cloud computing has aided the advancement of IT to higher heights. In the field of information technology, privacy and data security have long been a serious concern. It becomes more severe in the cloud computing environment because data is stored in multiple locations, often across the globe. Users' primary challenges regarding the cloud technology revolve around data security and privacy. We conduct a thorough assessment of the literature on data security and privacy issues, data encryption technologies, and related countermeasures in cloud storage systems in this study. Ubiquitous network connectivity, location-independent resource pooling, quick resource flexibility, usage-based pricing, and risk transference are all features of cloud computing.

Dr Manikandasaran S S

Cloud makes data storage very smart. It provides enormous amount of space to store the user’s data. These data are instantly available for the users at any time and it reduces the cost with respect to hardware support, technical experts available and license of the database. It leverages the small and medium scale enterprise straight away to start their business. Nevertheless cloud has many advantages; enterprises are undecided to deploy their data in the cloud storage, because data security issue is the top concern in Cloud Storage (CS). Security issues arose from the attack of cloud data by the hackers. Hackers are either outsiders from the enterprises or insiders from cloud service providers. This paper considers the issue that the CS is attacked by insiders from the cloud service provider. To protect this attack, this paper proposes the data confidentiality framework called AROMO. As per the proposed framework, user’s data are protected in the Cloud Storage. The proposed framework has a mechanism which uses two techniques to protect the data that are encryption and obfuscation. The data are encrypted and obfuscated before it is uploaded to CS. A metadata is maintained in the client. It contains the details of encryption and obfuscation applied on the data. To retrieve data from the CS, query is generated to run on encrypted and obfuscated data on the server side. Based on the query from the client, required data is fetched out from the CS; it could be decrypted and deobfuscated in client side based on the metadata details.

international journal for research in applied science and engineering technology ijraset

IJRASET Publication

Cloud computing is a popular approach that is used to store any kind of data or information over the internet rather than storing it on our desktops. But there is one major issue that arises when we wish to adopt this method which is the security of the data of the user. When data is stored in the cloud it is not completely under the control of the user. So we need to make use of methods that will make sure that the data of the user stored in the cloud cannot be accessed by the cloud service provider and that only valid or authorised users can access the data. These methods will ensure security of the data and will increase the rate of adoption of cloud computing services.

International Journal of Distributed Sensor Networks

Junsheng Zhang

Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe. Data security and privacy protection are the two main factors of user's concerns about the cloud technology. Though many techniques on the topics in cloud computing have been investigated in both academics and industries, data security and privacy protection are becoming more important for the future development of cloud computing technology in government, industry, and business. Data security and privacy protection issues are relevant to both hardware and software in the cloud architecture. This study is to review different security techniques and challenges from both software and hardware aspects for protecting data in the cloud and aims at enhancing the data security and privacy protection for the trustworthy cloud environment. In this paper, we make a comparative...

RELATED PAPERS

bharat gupta

Bangladesh Journal of Obstetrics & Gynaecology

Sameena Chowdhury

Empedrar la plaça. El naixement d'un observatori per a la coneixença de la història d'un poble?

Josep Antoni Gisbert Santonja

Special Matrices

Shmuel Friedland

IEEE Potentials

Patrick Donohoe

Soft Computing Journal

Soft Computing Journal (SCJ)

Mathematical Journal of Interdisciplinary Sciences

Manisha Patel

International Tax and Public Finance

British Journal of Oral and Maxillofacial Surgery

Flavio Azzola

Revista Brasileira de Engenharia Agrícola e Ambiental

léa paula Morais

Food Control

Michael Gyasi

Academic Medicine

Peter Angood

Lajos Zoltán Sápi

Dr Zulkiflu A Musa

rian hidayat

Jumantara: Jurnal Manuskrip Nusantara

Dwi Puspitorini

The Canadian Journal of Chemical Engineering

C. Lira-galeana

Lautaro Valentin Sanchez

Synergies Pays Riverains du Mékong

Postmodern Openings

Ana Voichita Tebeanu

Proceedings of the 2017 2nd International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2017)

Mudar Sarem

Pancreatology

Vladimir Khokha

International Journal of Biological and Chemical Sciences

Mamadi Camara

hukyytj jkthjfgr

See More Documents Like This

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

Cloud Computing Adoption in Public Sector: A Literature Review about Issues, Models and Influencing Factors

  • Conference paper
  • First Online: 05 April 2023
  • Cite this conference paper

Book cover

  • Ioannis Nanos 5  

Part of the book series: Springer Proceedings in Business and Economics ((SPBE))

Included in the following conference series:

  • Balkan Conference on Operational Research

252 Accesses

Cloud computing transforms the provision of information and communication technologies and is already affecting every aspect of economic and social activity. Moreover, it is considered as a disruptive technology that will contribute to the digital transformation of private and public organizations. Especially in the public sector cloud computing adoption can bring a number of benefits such as cost-savings, reduction of total cost of ownership, high availability of systems and services, provision of improved and enhanced capabilities, better services to citizens and more open, innovative and reliable authorities, both in central and in local government level. Therefore, public sector organizations should analyze cloud computing benefits and challenges and recognize factors that influence its adoption, in order to incorporate it into their strategy and initiatives for digital transformation. However, as found from the literature, scientific research concerning cloud computing adoption is rather limited, especially in public sector and more specifically in local government. The aim of this paper is to perform a literature review about cloud computing adoption in public sector. In this review, papers that study cloud computing adoption in public sector are identified, classified and analyzed, revealing theoretical-conceptual models that are applied and highlighting influencing factors that are examined through these models. The findings of our study indicate areas for future research and provide knowledge for managers and practitioners that will lead computing adoption in the public sector and more specifically in local government authorities.

  • Cloud computing
  • ICT adoption
  • Public sector

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Alshomrani, S., & Qamar, S. (2013). Cloud based E-government: Benefits and challenges. International Journal of Multidisciplinary Sciences and Engineering, 4 (6), 1–7.

Google Scholar  

Amron, M. T., Ibrahim, R., & Chuprat, S. (2017). A review on cloud computing acceptance factors. Procedia Computer Science, 124 , 639–646. https://doi.org/10.1016/j.procs.2017.12.200

Article   Google Scholar  

Bandara, W., Miskon, S., & Fielt, E. (2011). A systematic, tool-supported method for conducting literature reviews in information systems. In Proceedings of the 19th European Conference on Information Systems (ECIS 2011) . Helsinki, Finland.

Branco, T., Jr., Sa-Soares, F., & Lopez-Rivero, A. (2017). Key issues for the successful adoption of cloud computing. Procedia Computer Science, 121 , 115–122. https://doi.org/10.1016/j.procs.2017.11.016

Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25 (6), 599–616.

Cegielski, C. G., Jones-Farmer, L. A., Wu, Y., & Hazen, B. T. (2012). Adoption of cloud computing technologies in supply chains: An organizational information processing theory approach. The International Journal of Logistics Management, 23 (2), 184–211.

El-Gazzar, R. F. & Wahid, F. (2015). Strategies for cloud computing adoption: Insights from the Norwegian public sector. In Proceedings of the 12th European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS 2015) , Athens, Greece.

Jones, S., Irani, Z., Sivarajah, U., & Love, P. E. D. (2017). Risks and rewards of cloud computing in the UK public sector: A reflection on three organisational case studies. Information Systems Frontiers, 21 , 359–382.

Krogstie, J. & Veld, T. K. (2015). Information systems evolution efficiency – Differences between the public and the private sector, innovation and the public sector. In Joint proceedings of the 14th IFIP international conference on eGovernment (IFIP EGOV2015) and the 7th IFIP international conference on eParticipation (IFIP ePart2015): Electronic government and electronic participation , Thessaloniki, Greece.

Nanos, I., Manthou, V., & Androutsou, E., (2019). Cloud computing adoption decision in E-government. Operational research in the digital era – ICT challenges. In Springer Proceedings in Business and Economics (pp. 125–145). Springer.

Nanos, I., Misirlis, N., & Manthou, V. (2017). Cloud computing adoption and E-government. In Proceedings of the 6th international symposium and 28th National Conference on operational research “OR in the digital era - ICT challenges” , Thessaloniki, Greece, pp. 128–134.

Nanos, I., Papaioannou, E., Androutsou, E., & Manthou, V. (2019). The role of cloud computing and citizens relationship Management in Digital Government Transformation. International Journal of Internet Marketing and Advertising, ICCMI 2017: Special Issue on: “New Approaches for Innovative Business in the Era of Internet Marketing and Advertising”, 13 (2), 120–136.

Nayak, S., & Yassir, A. (2012). Cloud computing as an emerging paradigm. International Journal of Computer Science and Network Security, 12 (1), 61–65.

Okoli, C. (2015). A guide to conducting a standalone systematic literature review. Communications of the Association for Information Systems, 37 (43), 879–910.

Paquette, S., Jaeger, P. T., & Wilson, S. C. (2010). Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly, 27 (3), 245–253.

Senyo, P. K., Addae, E., & Boateng, R. (2018). Cloud computing research: A review of research themes, frameworks, methods and future research questions. International Journal of Information Management, 38 (1), 128–139.

Shin, D. H. (2013). User centric cloud service model in public sectors: Policy implications of cloud services. Government Information Quarterly, 30 (2), 194–203.

Vaquero, L. M., Rodero-Merino, L., Caceres, J., & Lindner, M. (2008). A break in the clouds: Towards a cloud definition. ACM SIGCOMM Computer Communication Review, 39 (1), 50–55.

Wang, C., Wood, L. C., Abdul-Rahman, H., & Lee, Y. T. (2016). When traditional information technology project managers encounter the cloud: Opportunities and dilemmas in the transition to cloud services. International Journal of Project Management, 34 (3), 371–388.

Zissis, D., & Lekkas, D. (2011). Securing e-government and e-voting with an open cloud computing architecture. Government Information Quarterly, 28 (2), 239–251.

Download references

Author information

Authors and affiliations.

Department of Applied Informatics, University of Macedonia, Thessaloniki, Greece

Ioannis Nanos

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Ioannis Nanos .

Editor information

Editors and affiliations.

School of Production Engineering and Management, Technical University of Crete, Chania, Greece

Nikolaos F. Matsatsinis

Department of Applied Informatics, School of Information Sciences, University of Macedonia, Thessaloniki, Greece

Fotis C. Kitsios

Michael A. Madas

Maria I. Kamariotou

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Cite this paper.

Nanos, I. (2023). Cloud Computing Adoption in Public Sector: A Literature Review about Issues, Models and Influencing Factors. In: Matsatsinis, N.F., Kitsios, F.C., Madas, M.A., Kamariotou, M.I. (eds) Operational Research in the Era of Digital Transformation and Business Analytics. BALCOR 2020. Springer Proceedings in Business and Economics. Springer, Cham. https://doi.org/10.1007/978-3-031-24294-6_26

Download citation

DOI : https://doi.org/10.1007/978-3-031-24294-6_26

Published : 05 April 2023

Publisher Name : Springer, Cham

Print ISBN : 978-3-031-24293-9

Online ISBN : 978-3-031-24294-6

eBook Packages : Business and Management Business and Management (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

IMAGES

  1. (PDF) Cloud Computing: A Systematic Literature Review and Future Agenda

    literature review on cloud computing pdf

  2. (PDF) A Systematic Literature Review on Cloud Computing Security

    literature review on cloud computing pdf

  3. (PDF) Blockchain Technology for Cloud Storage: A Systematic Literature

    literature review on cloud computing pdf

  4. (PDF) Research Paper on Cloud Computing

    literature review on cloud computing pdf

  5. (PDF) A Systematic Literature Review on Cloud Computing Security

    literature review on cloud computing pdf

  6. (PDF) Systematic Literature Review on Cloud Computing Security: Threats

    literature review on cloud computing pdf

VIDEO

  1. ''Evolution of Cloud Computing'' Cloud Computing Lecture 01 By Ms Shikha Agarwal, AKGEC

  2. PDF of Normal Distribution

  3. Introduction to Cloud Computing Webinar Recap

  4. Cloud Computing Trends in Canada

  5. CLOUD COMPUTING-TECHNOLOGIES FOR NETWORK BASED SYSTEMS UNIT-1 VIDEO-4

  6. Cloud Computing and its Application in Libraries

COMMENTS

  1. (PDF) Cloud Computing Trends: A Literature Review

    Assistant Professor, Ajman University, UAE. Doi: 10.36941/ajis-2020-0008. Abstract. This study is a literature review on cloud computing cloud computing trends as on e the fastest growing ...

  2. (PDF) Cloud Computing: A Systematic Literature Review and Future Agenda

    review is thought to inspire enterprises and managers that would like to use cloud computing in. terms of the scope, solution methods, factors, dimensions, and the results achieved in a holistic ...

  3. (PDF) A Literature Review on Cloud Computing Adoption ...

    The results of this review indicate that enterprises face serious issues before they decide to adopt cloud computing. Based on the findings, the paper provides a future information systems (IS ...

  4. PDF Cloud Computing: Literature Review

    Cloud Computing: Literature Review Rakibul Hassan Electrical and Computer Engineering Department George Mason University Fairfax, Virginia [email protected] Abstract—Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. Cloud computing is attractive to business owners as it eliminates

  5. PDF A Systematic Literature Review on Cloud Computing Adoption ...

    Cost-benefit relationship · Systematic literature review 1 Introduction Cloud Computing (CC) is a paradigm shift in computing that has changed the way users deal and perceive computing [26]. This scenario has created oppor-tunities for enterprises that have manifested perceived inclination toward cloud computing and the benefits reaped by ...

  6. A Literature Review on Cloud Computing Adoption Issues in ...

    The results of this review indicate that enterprises face serious issues before they decide to adopt cloud computing. Based on the findings, the paper provides a future information systems (IS) research agenda to explore the previously under-investigated areas regarding cloud computing adoption factors and processes.

  7. A Systematic Literature Review on Cloud Computing Adoption and

    In contrast to a non-structured review process, a Systematic Literature Review (SLR) [2, 12] reduces bias and follows a precise and rigorous sequence of methodological steps to research literature.SLR rely on well-defined and evaluated review protocols to extract, analyze, and document results as the stages conveyed in Fig. 1.This section describes the methodology applied for the phases of ...

  8. Towards Cloud Computing: A Literature Review on Cloud Computing and Its

    This article contains a review of technical literature relating the definitions, characteristics, operations, security management, service governance, and development trends of cloud computing. The advantages and disadvantages of cloud computing are respectively described to represent the impacts of cloud computing in various fields. The article also explains the structure of clouds in service ...

  9. A Systematic Literature Review on Cloud Computing Security: Threats and

    Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers. The security challenges associated with cloud computing have been widely studied in the literature. This systematic literature review (SLR) is aimed to review the existing research studies on cloud computing security, threats, and ...

  10. PDF Cloud Computing Trends: A Literature Review

    Keywords: cloud computing trends, cloud computing challenges, cloud computing governance 1. Background Companies have worked to store and protect data for decades, working to protect clients' confidential data. Firms developed cloud computing, as a way to provide secure data storage and processing power for firms and private individuals.

  11. Cloud computing service composition: A systematic literature review

    A systematic review in which the most important aspects of the accomplished researchers must be investigated, and useful information and statistics must be extracted. This paper provides a systematic literature review on state-of-the art approaches and techniques in addressing cloud computing service composition.

  12. A SYSTEMATIC LITERATURE REVIEW OF CLOUD COMPUTING IN E HEALTH

    The studies identified three types of studied areas about cloud computing in eHealth, namely (1) cloud-based eHealth framework design (n=13);(2) applications of cloud computing (n=17); and (3) security or privacy control mechanisms of healthcare data in the cloud (n=14). Most of the studies in the review were about designs and concept-proof.

  13. (PDF) A Systematic Literature Review on Cloud Computing Security

    associated with cloud computing have been widely studied in the literature. This systematic literature. review (SLR) is aimed to re view the existing research studies on cloud computing security ...

  14. PDF A Systematic Review of Cloud Computing Applications in Library and

    This systematic literature assessment on cloud computing applications in library and information management and service must admit its limits. Consider these restrictions: Language bias: The review only includes English language research. Non-English literature on library cloud computing applications may be missing. Database selection:

  15. Cloud Computing Adoption in Public Sector: A Literature Review about

    The aim of this paper is to perform a review that will identify, categorize and analyze existing literature about cloud computing adoption in public sector. Through this review, theoretical-conceptual models are identi fied, classi fied, analyzed and discussed, together with issues and in uencing factors that are examined by these fl models.

  16. [PDF] A Detailed Literature Review on Cloud Computing

    A Detailed Literature Review on Cloud Computing. Irving Wladawsky Berger, Aaron Ricadela, +2 authors. K. Hartig. Published 2014. Computer Science. TLDR. In this paper I have discussed about cloud and its use, how to implement cloud for better performance and different benefits and drawbacks of cloud which can improve in future. Expand.

  17. (PDF) A Systematic Literature Review on Cloud Computing Security

    Cloud security requirements have been addressed in publications earlier, but it is still difficult to estimate what kinds of requirements have been researched most, and which are still under-researched. This paper carries out a systematic literature review by identifying cloud computing security requirements from publications.

  18. PDF The Potentials of Using Cloud Computing in Schools: A Systematic ...

    Cloud Computing (CC) refers to the physical structure of a communications network, where data is stored in large data centers and can be accessed anywhere, at any time, and from different devices. This systematic literature review identifies and categorizes the potential and barriers of cloud-based teaching in schools from an

  19. (PDF) The Rise of Cloud Computing: Data Protection, Privacy, and Open

    However, this one aspect of cloud computing alone poses several security issues that demand attention and thorough explanation. Therefore, a literature analysis was undertaken as part of this study to look into the problems that cloud computing has faced in the past and present as well as the many data security methods that are employed there.

  20. (PDF) Challenges of cloud computing use: A systematic literature review

    Methods: We conducted a systematic literature review of potential challenges of cloud computing. Documents that described challenges of cloud computing were collected of routinely. We grouped ...

  21. PDF Cloud Computing & tization: A Case Study and Future Trends THESIS

    Cloud Computing & Servitization: A Case Study & FutureTrends 1.2 Scope This master thesis will focus on the adoption of CC toward business; while collecting information, the documents and journals taken into consideration come from academic sources. In addition, small and medium enterprises will be considered to identify if cloud

  22. PDF A Detailed Literature Review on Cloud Computing

    A Detailed Literature Review on Cloud Computing Archana Srivastava (Sr. Lecturer) Babu Banarsi Das University Lucknow, Utter Pradesh India Abstract - Cloud computing is an architecture for facilitating computing service through the internet on requirement and pay per use access to a group of shared resources namely networks, storage, servers, ...

  23. Cloud Computing Adoption in Public Sector: A Literature Review about

    The systematic literature review performed in this study is based on methodologies proposed by Bandara et al. and Okoli and consists of three stages: i) research design, ii) paper selection and iii) analysis.Research Design. The aim of the research is to identify and analyze the existing literature about cloud computing adoption in public sector, in order to contribute to the scientific ...

  24. Role of Artificial Intelligence in the Prevention of Online Child

    The ability of artificial intelligence to predict and stop sexual abuse in children is very promising. AI-based technologies that can aid in the identification and prevention of violence against children include mobile computing, the Internet of Things, chatbots, machine learning, pattern recognition, and cloud computing.