References
References:
1. Lim,S.Y.;Kiah,M.M.;Ang,T.F.SecurityIssuesandFutureChallengesofCloudServiceAuthentication.Polytech.Hung.2017, 14, 69–89.
2. Borylo, P.;Tornatore, M.;Jaglarz, P.;Shahriar, N.;Cholda, P.;Boutaba, R. Latency and energy-awareprovisioningofnetworkslicesincloudnetworks.Comput.Commun. 2020,157,1–19.
3. Carmo, M.; Dantas Silva, F.S.; Neto, A.V.; Corujo, D.; Aguiar, R. Network-Cloud Slicing Definitions for Wi-Fi Sharing Systems to Enhance 5G Ultra-Dense Network Capabilities.Wirel. Commun. Mob. Comput.2019, 2019,1–17.
4. Dang, L.M.; Piran, M.; Han, D.; Min, K.; Moon, H. A Survey on Internet of Things and Cloud Computing forhealthcare.Electronics2019,8,768.
5. Srinivasamurthy, S.; Liu, D. Survey on Cloud Computing Security. 2020. Available online: https://www.semanticscholar.org/(accessedon19July2020).
6. Mathkunti,N.CloudComputing:SecurityIssues.Int.J.Comput.Commun.Eng.2014,3,259–263
7. Stefan, H.;Liakat, M. Cloud Computing Security Threats And Solutions.J. Cloud Comput.2015, 4, 1.[CrossRef]
8. Fauzi,C.;Azila,A.;Noraziah,A.;Tutut,H.;Noriyani,Z.OnCloudComputingSecurityIssues.Intell. Inf.DatabaseSyst. Lect.NotesComput.Sci. 2012,7197,560–569.
9. Palumbo,F.;Aceto,G.;Botta,A.;Ciuonzo,D.;Persico,V.;Pescapé,A.CharacterizingCloud-to-userLatencyas perceived by AWS and Azure Users spread over the Globe.In Proceedings of the 2019 IEEE GlobalCommunicationsConference (GLOBECOM), Taipei,Taiwan, 7–11 December2019; pp.1–6.
10. Hussein,N.H.;Khalid,A.AsurveyofCloudComputingSecuritychallengesandsolutions.Int.J.Comput.Sci.Inf.Secur.2017,1,52–56.
11. LeDuc,T.;Leiva,R.G.;Casari,P.;Östberg,P.O.MachineLearningMethodsforReliableResourceProvisioninginEdge-CloudComputing:ASurvey.ACMComput.Surv.2019,52,1–39.
12. Li,K.;Gibson,C.;Ho,D.;Zhou,Q.;Kim,J.;Buhisi,O.;Gerber,M.Assessmentofmachinelearningalgorithmsincloudcomputingframeworks.InProceedingsoftheIEEESystemsandInformationEngineeringDesignSymposium,Charlottesville,VA,USA,26April2013;pp.98–103.
13. Callara, M.;Wira, P. User Behavior Analysis with Machine Learning Techniques in Cloud ComputingArchitectures.In Proceedings of the 2018 International Conference on Applied Smart Systems, Médéa,Algeria,24–25November2018;pp.1–6.
14. Singh,S.;Jeong,Y.-Security:Issues,Threats,andSolutions.J.Netw.Comput.Appl.2016,75,200–222.
15. Khan, A.N.; Fan, M.Y.; Malik, A.; Memon, R.A. Learning from Privacy Preserved Encrypted Data on CloudThroughSupervisedandUnsupervisedMachineLearning.InProceedingsoftheInternationalConferenceonComputing,MathematicsandEngineeringTechnologies,Sindh,Pakistan,29–30January2019;pp.1–5.
16. Khilar,P.;Vijay, C.;Rakesh, S. Trust-Based Access Control in Cloud Computing Using Machine Learning.In Cloud Computing for Geospatial Big Data Analytics; Das, H., Barik, R., Dubey, H., Roy, D., Eds.; Springer:Cham,Switzerland,2019;Volume49,pp.55–79.
17. Subashini,S.;Kavitha,V. A Survey on SecurityIssuesinService Delivery Models of Cloud Computing.J.Netw.Comput.Appl.2011,35,1–11.
18. Bhamare, D.; Salman, T.; Samaka, M.; Erbad, A.; Jain, R. Feasibility of Supervised Machine Learning for Cloud Security. In Proceedings of the International Conference on Information Science and Security, Jaipur, India, 16–20 December 2016; pp. 1–5.
19. Li, C.; Song, M.; Zhang, M.; Luo, Y. Effective replica management for improving reliability and availabilityinedge-cloudcomputingenvironment.J.ParallelDistrib.Comput.2020,143,107–128.
20. Purniemaa, P.; Kannan, R.; Jaisankar, N. Security Threat and Attack in Cloud Infrastructure: A Survey.Int. J.Comput.Sci.Appl.2013,2,1–12.
21. Yuhong, L.; Yan, S.; Jungwoo, R.; Syed, R.; Athanasios, V. A Survey of Security and Privacy Challenge inCloudComputing:SolutionsandFuture Directions.J.Comput.Sci.Eng.2015,9,119–133.
22. Chirag, M.; Dhiren, P.; Bhavesh, B.; Avi, P.; Muttukrishnan, R. A survey on security issues and solutions at differentlayers ofCloudcomputing.J.Supercomput.2013,63,561–592.
23. Behl,A.;Behl,K.Ananalysisofcloudcomputingsecurityissues.InProceedingoftheWorldCongresson Information and Communication Technologies,Trivandrum, India, 30 October–2 November 2012;pp.109–114.
24. Selamat,N.;Ali,F.Comparisonofmalwaredetectiontechniquesusingmachinelearningalgorithm.Indones.J.Electr.Eng.Comput.Sci.2019,16,435.]
25. Shamshirband, S.; Fathi, M.; Chronopoulos, A.T.; Montieri, A.; Palumbo, F.; Pescapè, A. ComputationalIntelligence Intrusion Detection Techniques in Mobile Cloud Computing Environments: Review, Taxonomy,andOpenResearchIssues.J.Inf.Secur.Appl.2019,1–52.