IJITCS Vol. 16, No. 4, 8 Aug. 2024
Cover page and Table of Contents: PDF (size: 1005KB)
PDF (1005KB), PP.1-28
Views: 0 Downloads: 0
Cloud Computing, Cloud Security, Cloud Security Challenges, Application Security, Network Security, Data Security, Host Security
Industry heavyweights like Microsoft, Amazon, and Google are at the forefront of the development and provision of cutting-edge and affordable cloud computing solutions, contributing to the widespread recognition of cloud computing. Without requiring direct human control, this technology provides network services, including data storage and computational power. But security becomes apparent as a major issue, hindering widespread adoption. The present study performs an extensive investigation to investigate security concerns related to cloud computing at several infrastructure levels, including application, network, host, and data. It examines significant issues that could impact the business model for cloud computing and discuss ways to solve security issues at every level that have been documented in the literature. The study identifies open problems, especially when considering cloud capabilities like elasticity, flexibility, and multi-tenancy, which create new problems at every infrastructure tier. Notably, it is found that multi-tenancy has a significant influence, contributing to security issues at all levels including abuse, unavailability, data loss, and privacy violations. The research ends with practical recommendations for additional studies targeted at improving overall cloud computing security. The results highlight the necessity of concentrated effort on mitigating security vulnerabilities resulting from multi-tenancy. This study makes a valuable contribution to the wider discussion on cloud security by identifying particular issues and supporting focused initiatives to strengthen the resilience of cloud infrastructure.
Md. Abul Hayat, Sunriz Islam, Md. Fokhray Hossain, "Securing the Cloud Infrastructure: Investigating Multi-tenancy Challenges, Modern Solutions and Future Research Opportunities", International Journal of Information Technology and Computer Science(IJITCS), Vol.16, No.4, pp.1-28, 2024. DOI:10.5815/ijitcs.2024.04.01
[1]Elsherbiny, S.; Eldaydamony, E.; Alrahmawy, M.; Reyad, A.E. An extended Intelligent Water Drops algorithm for workflow scheduling in cloud computing environment. Egypt. Inf. J. 2018, 19, 33–55.
[2]Hanen, J.; Kechaou, Z.; Ben Ayed, M. An enhanced healthcare system in mobile cloud computing environment. Vietnam J. Comput. Sci. 2016, 3, 267–277.
[3]Bassi, Sonia, and Anjali Chaudhary. "Cloud Computing Data Security–Background and Benefits." International Journal of Computer Science & Communication 6.1 (2015).
[4]On technical security issues in cloud computing, Meiko Jensen etal, 2009.
[5]Mell, P.; Grance, T. The NIST Definition of Cloud Computing; Nation-al Institute of Standards and Technology: Gaithersburg, MD, USA, 2011.
[6]L.M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner. A break in the clouds: towards a cloud definition, in:ACM SIGCOMM Computer Communication Review, 2008.p.50-55.
[7]M.B. Mollah, K.R. Islam, and S.S. Islam. Next generation of computing through cloud computing technology, in: 2012 25th IEEE Canadian Conference on Electrical Computer Engineering (CCECE), May 2012.p.1-6.
[8]Hatwar, S.V.; Chavan, R. Cloud Computing Security Aspects, Vulnerabilities and Countermeasures. Int. J. Comput. Appl. 2015, 119, 46–53.
[9]Dinh, P.T.; Park, M. Dynamic Economic-Denial-of-Sustainability (EDoS) Detection in SDN-based Cloud. In Proceedings of the 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), Paris, France, 20–23 April 2020.
[10]Karajeh, H.; Maqableh, M.; Masa’deh, R. Privacy and security issues of cloud computing environment. In Proceedings of the 23rd IBIMA Conference Vision, Valencia, Spain, 13–14 May 2020.
[11]Han, J.; Zang, W.; Chen, S.; Yu, M. Reducing Security Risks of Clouds Through Virtual Machine Placement. In Proceedings of the IFIP Annual Conference on Data and Applications Security and Privacy, Philadelphia, PA, USA, 19–21 July 2017.
[12]Saravanan, N.; Umamakeswari, A. Lattice based access control for protecting user data in cloud environments with hybrid security. Comput. Secur. 2021, 100, 102074.
[13]Zulifqar, I., Anayat, S. and Kharal, I., 2021. A Review of Data Security Challenges and their Solutions in Cloud Computing. International Journal of Information Engineering & Electronic Business, 13(3).
[14]Alghofaili, Y., Albattah, A., Alrajeh, N., Rassam, M.A. and Al-Rimy, B.A.S., 2021. Secure cloud infrastructure: A survey on issues, current solutions, and open challenges. Applied Sciences, 11(19), p.9005.
[15]Siddiqui, S.; Darbari, M.; Yagyasen, D. A Comprehensive Study of Challenges and Issues in Cloud Computing. In Soft Computing and Signal Processing; Springer: Singapore, 2019; pp. 325–344.
[16]Marston, S.; Li, Z.; Bandyopadhyay, S.; Ghalsasi, A. Cloud Computing—The Business Perspective. Decis. Support Syst. 2011, 51, 176–189.
[17]https://www.geeksforgeeks.org/cloud-stakeholders-as-per-nist/, accessed on 12/31/2023.
[18]Kuyoro, S.; Ibikunle, F.; Awodele, O. Cloud computing security issues and challenges. Int. J. Comput. Netw. 2011, 3, 247–255.
[19]Alajmi, Q.; Sadiq, A.S.; Kamaludin, A.; A Al-Sharafi, M. Cloud Computing Delivery and Delivery Models: Opportunity and Challenges. Adv. Sci. Lett. 2018, 24, 4040–4044.
[20]Diaby, T. and Rad, B.B., 2017. Cloud computing: a review of the concepts and deployment models. International Journal of Information Technology and Computer Science, 9(6), pp.50-58.
[21]Chauhan, V.K.; Bansal, K.; Alappanavar, P. Exposing cloud computing as a failure. Int. J. Eng. Sci. Technol. 2012, 4, 1320–1326.
[22]Faheem, M.; Akram, U.; Khan, I.; Naqeeb, S.; Shahzad, A.; Ullah, A.; Mushtaq, M.F. Cloud Computing Environment and Security Challenges: A Review. Int. J. Adv. Comput. Sci. Appl. 2017, 8, 183–195.
[23]Sikeridis, D., Papapanagiotou, I., Rimal, B.P. and Devetsikiotis, M., 2017. A Comparative taxonomy and survey of public cloud infrastructure vendors. arXiv preprint arXiv:1710.01476.
[24]21. Subramanian, N.; Jeyaraj, A. Recent security challenges in cloud computing. Comput. Electr. Eng. 2018, 71, 28–42.
[25]Kumar, P.R., Raj, P.H. and Jelciana, P., 2018. Exploring data security issues and solutions in cloud computing. Procedia Computer Science, 125, pp.691-697.
[26]Bokhari, M.U.; Makki, Q.; Tamandani, Y.K. A Survey on Cloud Computing. In Big Data Analytics; Advances in Intelligent Systems and Computing; Springer: Singapore, 2018; Volume 654, pp. 149–164.
[27]Abdurachman, E.; Gaol, F.L.; Soewito, B. Survey on Threats and Risks in the Cloud Computing Environment. Procedia Comput. Sci. 2019, 161, 1325–1332.
[28]Dong, S., Abbas, K. and Jain, R., 2019. A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments. IEEE Access, 7, pp.80813-80828.
[29]Alhenaki, L., Alwatban, A., Alamri, B. and Alarifi, N., 2019, May. A survey on the security of cloud computing. In 2019 2nd international conference on computer applications & information security (ICCAIS) (pp. 1-7). IEEE.
[30]Tabrizchi, H.; Rafsanjani, M.K. A survey on security challenges in cloud computing: Issues, threats, and solutions. J. Supercomput. 2020, 76, 9493–9532.
[31]Domingo-Ferrer, J.; Farràs, O.; Ribes-González, J.; Sánchez, D. Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges. Comput. Commun. 2019, 140, 38–60.
[32]Kumar, R. and Goyal, R., 2019. On cloud security requirements, threats, vulnerabilities and countermeasures: A survey. Computer Science Review, 33, pp.1-48.
[33]Ibrahim, F.A.M.; Hemayed, E.E. Trusted Cloud Computing Architectures for infrastructure as a service: Survey and systematic literature review. Comput. Secur. 2019, 82, 196–226.
[34]Qureshi, A.; Dashti, W.; Jahangeer, A.; Zafar, A. Security Challenges over Cloud Environment from Service Provider Prospective. Cloud Comput. Data Sci. 2020, 1, 1–48.
[35]An, Y.Z.; Zaaba, Z.F.; Samsudin, N.F. Reviews on Security Issues and Challenges in Cloud Computing. IOP Conf. Ser. Mater. Sci. Eng. 2016, 160, 012106.
[36]Saini, H.; Saini, A. Security Mechanisms at different Levels in Cloud Infrastructure. Int. J. Comput. Appl. 2014, 108, 1–6.
[37]Cloud computing: security risks and security measures, Ben Nancholas, https://online.york.ac.uk/cloud-computing-security-risks-and-security-measures/, accessed on 2/1/2024.
[38]Harpreet Saini, Amandeep Saini, “Security Mechanisms at different Levels in Cloud Infrastructure”, International Journal of Computer Applications. Volume 108 – No. 2, December 2014. http://dx.doi.org/10.5120/18880-0153.
[39]Dimitrios Zissis, Dimitrios Lekkas, “Addressing cloud computing security issues”, Future Generation Computer Systems. Vol. 28, Issue 3, March 2012, Pages 583–592 http://dx.doi.org/10.1016/j.future.2010.12.006
[40]Vahid Ashktorab, Seyed Reza Taghizadeh, “Security Threats and Countermeasures in Cloud Computing”, International Journal of Application or Innovation in Engineering & Management (IJAIEM). Volume 1, Issue 2, October 2012,
[41]R. Charanya, M.Aramudhan, K. Mohan, S. Nithya, “Levels of Security Issues in Cloud Computing”, International Journal of Engineering and Technology (IJET), Vol 5 No 2 Apr-May 2013
[42]Katerina Lourida1, Antonis Mouhtaropoulos2, Alex Vakaloudis3, “Assessing Database and Network Threats in Traditional and Cloud Computing”, International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2(3): 1-17, 2013
[43]Aarti Singh, Manisha Malhotra, “Security Concerns at Various Levels of Cloud Computing Paradigm: A Review”, International Journal of Computer Networks and Applications. Vol. 2, Issue 2, March – April (2015).
[44]Kashif Munir and Sellapan Palaniappan, “Security Threats/Attacks Present in Cloud Environment”, IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.12, December 2012.
[45]Kashif Munir and Prof Dr. Sellapan Palaniappan, “secure cloud architecture”, Advanced Computing: An International Journal (ACIJ), Vol.4, No.1, January 2013
[46]Jaydip Sen, “Security and Privacy Issues in Cloud Computing”, Chapter 1. Architectures and Protocols for Secure Information Technology Infrastructures. IGI Global. Pp. 1-45. DOI: 10.4018/978-1-4666-4514-1.ch001
[47]Ankur Pandey,Kirtee Shevade, Roopali Soni , “Application Level Security in Cloud Computing”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (6), 2012,5369-5373
[48]Tauseef Ahmad, Mohammad Amanul Haque, Khaled Al-Nafjan, Asrar Ahmad Ansari, “Development of Cloud Computing and Security Issues”, Information and Knowledge Management. Vol.3, No.1, 2013.
[49]Top 10 Security Issues in Cloud Computing, https://www.veritis.com/blog/top-10-security-issues-in-cloud-computing/, accessed on 2/1/2024.
[50]Zero-Day-Exploits & Zero-day Attack, https://www.kaspersky.com/resource-center/definitions/zero-day-exploit, accessed on 3/1/2024.
[51]What are insider threats? https://www.ibm.com/topics/insider-threats, accessed on 3/1/2024.
[52]Singh, A.P.; Pasupuleti, S.K. Optimized Public Auditing and Data Dynamics for Data Storage Security in Cloud Computing. Procedia Comput. Sci. 2016, 93, 751–759.
[53]Balogh, Z.; Turˇcáni, M. Modeling of data security in cloud computing. In Proceedings of the 2016 Annual IEEE Systems Conference (SysCon), Orlando, FL, USA, 18–21 April 2016.
[54]Vurukonda, N.; Rao, B.T. A Study on Data Storage Security Issues in Cloud Computing. Procedia Comput. Sci. 2016, 92, 128–135.
[55]Sajay, K.R., Babu, S.S. and Vijayalakshmi, Y., 2019. Enhancing the security of cloud data using hybrid encryption algorithm. Journal of Ambient Intelligence and Humanized Computing, pp.1-10.
[56]Khan, I.A.; Qazi, R. Data Security in Cloud Computing Using Elliptic Curve Cryptography. Int. J. Comput. Commun. Netw. 2019, 1, 46–52.
[57]Belguith, S.; Jemai, A.; Attia, R. Enhancing data security in cloud computing using a lightweight cryptographic algorithm. In Proceedings of the Eleventh International Conference on Autonomic and Autonomous Systems, Rome, Italy, 24–29 May 2015.
[58]Li, P., Li, J., Huang, Z., Gao, C.Z., Chen, W.B. and Chen, K., 2018. Privacy-preserving outsourced classification in cloud computing. Cluster Computing, 21, pp.277-286.
[59]Sood, S.K. A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 2012, 35, 1831–1838.
[60]Zhang, Y.; Chen, X.; Li, J.; Wong, D.S.; Li, H.; You, I. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf. Sci. 2017, 379, 42–61.
[61]Tawalbeh, L.; Darwazeh, N.S.; Al-Qassas, R.S.; AlDosari, F. A Secure Cloud Computing Model based on Data Classification. Procedia Comput. Sci. 2015, 52, 1153–1158.
[62]Shaikh, R.; Sasikumar, M. Data Classification for Achieving Security in Cloud Computing. Procedia Comput. Sci. 2015, 45, 493–498.
[63]Amalarethinam, I.G. and Leena, H.M., 2017, February. Enhanced RSA algorithm with varying key sizes for data security in cloud. In 2017 World Congress on Computing and Communication Technologies (WCCCT) (pp. 172-175). IEEE.
[64]Manogaran, G.; Thota, C.; Kumar, M.V. MetaCloudDataStorage Architecture for Big Data Security in Cloud Computing. Procedia Comput. Sci. 2016, 87, 128–133.
[65]Somani, G.; Gaur, M.S.; Sanghi, D.; Conti, M.; Rajarajan, M. Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks. IEEE Trans. Dependable Secur. Comput. 2018, 15, 959–973.
[66]Wani, A.R.; Rana, Q.P.; Saxena, U.; Pandey, N. Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques. In Proceedings of the 2019 Amity International Conference on Artificial Intelligence (AICAI), Dubai, United Arab Emirates, 4–6 February 2019.
[67]Ficco, M.; Rak, M. Economic denial of sustainability mitigation in cloud computing. In Organizational Innovation and Change; Springer International Publishing: Cham, Switzerland, 2016; pp. 229–238.
[68]Irshad, A., Chaudhry, S.A., Alomari, O.A., Yahya, K. and Kumar, N., 2020. A novel pairing-free lightweight authentication protocol for mobile cloud computing framework. IEEE Systems Journal, 15(3), pp.3664-3672.
[69]Nautiyal, S.; Wadhwa, S. A Comparative Approach to Mitigate Economic Denial of Sustainability (EDoS) in a Cloud Environment. In Proceedings of the 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 21–22 November 2019.
[70]Zhang, Y.; Krishnan, R.; Sandhu, R. Secure Information and Resource Sharing in Cloud Infrastructure as a Service. In Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, Scottsdale, AZ, USA, 3 November 2014; pp. 81–90.
[71]Rehman, F.; Akram, S.; Shah, M.A. The framework for efficient passphrase-based multifactor authentication in cloud computing. In Proceedings of the 2016 22nd International Conference on Automation and Computing (ICAC), Colchester, UK, 7–8 September 2016.
[72]Banyal, R.K.; Jain, V.K.; Jain, P. Dynamic Trust Based Access Control Framework for Securing Multi-Cloud Environment. In Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies— ICTCS ’14, Udaipur, India, 14–16 November 2014.
[73]Ojha, S.; Rajput, V. AES and MD5 based secure authentication in cloud computing. In Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 10–11 February 2017.
[74]Auxilia, M.; Raja, K. Dynamic Access Control Model for Cloud Computing. In Proceedings of the 2014 Sixth International Conference on Advanced Computing (ICoAC), Chennai, India, 17–19 December 2014.
[75]Rajeswari, P., Viswanadha Raju, S., Ashour, A.S. and Dey, N., 2017. Multi-fingerprint unimodel-based biometric authentication supporting cloud computing. Intelligent techniques in signal processing for multimedia security, pp.469-485.
[76]Zhou, C. and Li, B., 2014, December. iHAC: a hybrid access control framework for IaaS clouds. In 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (pp. 853-858). IEEE.
[77]Lingamgunta, S., 2020. Multi Factor Two-way Hash-Based Authentication in Cloud Computing. International Journal of Cloud Applications & Computing, 10(2).
[78]Yang, C.; Tan, L.; Shi, N.; Xu, B.; Cao, Y.; Yu, K. AuthPrivacyChain: A Blockchain-Based Access Control Framework with Privacy Protection in Cloud. IEEE Access 2020, 8, 70604–70615.
[79]Deebak, B.D., Al-Turjman, F. and Mostarda, L., 2020. Seamless secure anonymous authentication for cloud-based mobile edge computing. Computers & Electrical Engineering, 87, p.106782.
[80]Bendiab, K., Kolokotronis, N., Shiaeles, S. and Boucherkha, S., 2018, August. WiP: A novel blockchain-based trust model for cloud identity management. In 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech) (pp. 724-729). IEEE.
[81]Sharma, D.H.; Dhote, C.; Potey, M. Identity and Access Management as Security-as-a-Service from Clouds. Procedia Comput. Sci. 2016, 79, 170–174.
[82]Bendiab, G.; Shiaeles, S.; Boucherkha, S.; Ghita, B. FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management. Comput. Secur. 2019, 86, 270–290.
[83]Khajehei, K., 2018. Preserving Privacy in Cloud Identity Management Systems Using DCM (Dual Certificate Management). Int. J. Wirel. Microw. Technol, 8(4), pp.54-65.
[84]Maithili, K.; Vinothkumar, V.; Latha, P. Analyzing the Security Mechanisms to Prevent Unauthorized Access in Cloud and Network Security. J. Comput. Nanosci. 2018, 15, 2059–2063.
[85]Velliangiri, S.; Karthikeyan, P.; Kumar, V.V. Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks. J. Exp. Artif. Intell. 2021, 1–20.
[86]Liang, K., Zhao, L., Chu, X. and Chen, H.H., 2017. An integrated architecture for software defined and virtualized radio access networks with fog computing. IEEE Network, 31(1), pp.80-87.
[87]Zimba, A.; Chen, H.; Wang, Z. Bayesian network based weighted APT attack paths modeling in cloud computing. Future Gener. Comput. Syst. 2019, 96, 525–537.
[88]Patil, R., Dudeja, H. and Modi, C., 2019. Designing an efficient security framework for detecting intrusions in virtual network of cloud computing. Computers & Security, 85, pp.402-422.
[89]Jouini, M.; Rabai, L.B.A. A. A security framework for secure cloud computing environments. In Cloud Security: Concepts, Methodologies, Tools, and Applications; IGI Global: Hershey, PA, USA, 2019; pp. 249–263.
[90]Hassan, Z., Odarchenko, R., Gnatyuk, S., Zaman, A. and Shah, M., 2018, October. Detection of distributed denial of service attacks using snort rules in cloud computing & remote control systems. In 2018 IEEE 5th International Conference on Methods and Systems of Navigation and Motion Control (MSNMC) (pp. 283-288). IEEE.
[91]Badve, O.P.; Gupta, B.; Yamaguchi, S.; Gou, Z. DDoS detection and filtering technique in cloud environment using GARCH model. In Proceedings of the 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE), Osaka, Japan, 27–30 October 2015.
[92]Rajendran, B. and Shetty, P., 2018. Domain name system (dns) security: Attacks identification and protection methods. In Proceedings of the International Conference on Security and Management (SAM) (pp. 27-33). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
[93]Jaber, A.N.; Zolkipli, M.F.; Shakir, H.A.; Jassim, M.R. Host based intrusion detection and prevention model against DDoS attack in cloud computing. In Proceedings of the International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Barcelona, Spain, 8–10 November 2017.
[94]Kumara, A.; Jaidhar, C. Hypervisor and virtual machine dependent Intrusion Detection and Prevention System for virtualized cloud environment. In Proceedings of the 2015 1st International Conference on Telematics and Future Generation Networks (TAFGEN), Kuala Lumpur, Malaysia, 26–28 May 2015.
[95]Dildar, M.S., Khan, N., Abdullah, J.B. and Khan, A.S., 2017, March. Effective way to defend the hypervisor attacks in cloud computing. In 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) (pp. 154-159). IEEE.
[96]Ramamoorthy, S.; Rajalakshmi, S. A Preventive Method for Host Level Security in Cloud Infrastructure. In Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC–16’); Springer: Cham, Switzerland, 2016; pp. 3–12.
[97]Bazm, M.-M.; Lacoste, M.; Südholt, M.; Menaud, J.-M. Isolation in cloud computing infrastructures: New security challenges. Ann. Telecommun. 2019, 74, 197–209.
[98]Deshpande, S.M.; Ainapure, B. An Intelligent Virtual Machine Monitoring System Using KVM for Reliable And Secure Environment in Cloud. In Proceedings of the 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT), Pune, India, 2–3 December 2016.
[99]Deshpande, P.; Sharma, S.C.; Peddoju, S.K.; Junaid, S. HIDS: A host based intrusion detection system for cloud computing environment. Int. J. Syst. Assur. Eng. Manag. 2018, 9, 567–576.
[100]Gomez-Rodriguez, M.A.; Sosa-Sosa, V.J.; Gonzalez-Compean, J.L. Assessment of Private Cloud Infrastructure Monitoring Tools. In Proceedings of the 6th International Conference on Data Science, Technology and Applications, Madrid, Spain, 26–28 July 2017.
[101]Mahajan, V. and Peddoju, S.K., 2017, August. Deployment of intrusion detection system in cloud: A performance-based study. In 2017 IEEE Trustcom/BigDataSE/ICESS (pp. 1103-1108). IEEE.
[102]Singh, P.; Khan, B.; Vidyarthi, A.; Alhelou, H.H.; Siano, P. Energy-Aware Online Non-Clairvoyant Scheduling Using Speed Scaling with Arbitrary Power Function. Appl. Sci. 2019, 9, 1467.
[103]Khorsand, R.; Ramezanpour, M. An energy-efficient task-scheduling algorithm based on a multi-criteria decision-making method in cloud computing. Int. J. Commun. Syst. 2020, 33, e4379.
[104]Fernández-Cerero, D.; Jakóbik, A.K.; Grzonka, D.; Kołodziej, J.; Fernández-Montes, A. Security supportive energy-aware scheduling and energy policies for cloud environments. J. Parallel Distrib. Comput. 2018, 119, 191–202.
[105]Fernández-Cerero, D.; Fernández-Montes, A.; Jakóbik, A.; Kołodziej, J.; Toro, M. SCORE: Simulator for cloud optimization of resources and energy consumption. Simul. Model. Pract. Theory 2018, 82, 160–173.
[106]Vaquero, L.M.; Rodero-Merino, L.; Caceres, J.; Lindner, M. A Break in the Clouds: Towards a Cloud Definition; ACM: New York, NY, USA, 2008.
[107]Al Amri, S.M.; Guan, L. Infrastructure as a service: Exploring network access control challenges. In Proceedings of the 2016 SAI Computing Conference (SAI), London, UK, 13–15 July 2016.