{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:25:29Z","timestamp":1730287529925,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T00:00:00Z","timestamp":1698192000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T00:00:00Z","timestamp":1698192000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,25]]},"DOI":"10.1109\/pais60821.2023.10322004","type":"proceedings-article","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T19:07:12Z","timestamp":1700680032000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Security Issues in Cloud-based IoT Systems"],"prefix":"10.1109","author":[{"given":"Rahma","family":"Berchi","sequence":"first","affiliation":[{"name":"University Ferhat Abbas Sétif 1,LRSD Laboratory, Faculty of Sciences,Sétif,Algeria"}]},{"given":"Lemia","family":"Louail","sequence":"additional","affiliation":[{"name":"Université de Lorraine, CNRS, CRAN,Nancy,France,F-54000"}]},{"given":"Sarra","family":"Cherbal","sequence":"additional","affiliation":[{"name":"University Ferhat Abbas Sétif 1,LRSD Laboratory, Faculty of Sciences,Sétif,Algeria"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WOCC53213.2021.9603112"},{"article-title":"Survey on security and privacy of cloud computing paradigm: Challenges and mitigation methods","year":"2023","author":"Hussain","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1063\/5.0111138"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s21175922"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.26438\/ijcse\/v7i2.421426"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5267\/j.ijdns.2022.11.009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2979807"},{"key":"ref8","first-page":"102642","article-title":"Security and privacy protection in cloud computing: Discussions and challenges","volume-title":"Journal of Network and Computer Applications","volume":"160","author":"Sun","year":"2020"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CloudSummit47114.2019.00007"},{"article-title":"Edge, fog, and cloud computing: An overview on challenges and applications","year":"2022","author":"Vo","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-09960-z"},{"article-title":"A comparative economic analysis for cloud computing","year":"2022","author":"Nhim","key":"ref12"},{"journal-title":"A review: Security mechanisms in cloud computing","author":"Singh","key":"ref13"},{"volume-title":"Cloud Computing Simplified: Explore Application of Cloud, Cloud Deployment Models, Service Models and Mobile Cloud Computing (English Edition).","year":"2021","author":"Rastogi","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.48161\/qaj.v1n2a36"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.29121\/granthaalayah.v8.i8.2020.926"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/3ICT.2019.8910320"},{"issue":"5","key":"ref18","first-page":"1172","article-title":"Exploration of various view-points in cloud computing security threats","volume":"99","author":"Mohanaprakash","year":"2021","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v27.i3.pp1610-1618"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.10.005"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2020.07.452"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.32628\/CSEIT206667"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12061333"},{"key":"ref24","first-page":"207","article-title":"Buffer overflow attack and defense techniques","volume":"21","author":"Alzahrani","year":"2021","journal-title":"Int. J. Comput. Sci. Netw. Secur"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3037359"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2953740"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSIT53264.2022.9716317"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/hbe2.301"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.0140337"},{"issue":"1","key":"ref30","first-page":"1","article-title":"Cloud computing threats, vulnerabilities and countermeasures: A state-of-the-art","volume":"15","author":"Pericherla","year":"2023","journal-title":"The ISC International Journal of Information Security"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2023922832"},{"issue":"si7","key":"ref32","first-page":"405","article-title":"A comprehensive review on cloud computing security","volume":"8","author":"Teni","year":"2023","journal-title":"Vidhyayana-An International Multidisciplinary Peer-Reviewed E-Journal-ISSN 2454-8596"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.9734\/ajrcos\/2023\/v15i4327"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.03.005"},{"key":"ref35","article-title":"Improved ssl\/tls man-in-the-middle attack detection technique using timing analysis and other behavioral anomalies","volume-title":"Ph.D. dissertation","author":"Folarin","year":"2019"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/s22030709"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3109081"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1049\/sfw2.12066"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1187-7"},{"issue":"si7","key":"ref40","first-page":"352","article-title":"Cloud computing security issues and existing solutions","volume":"8","author":"Roy","year":"2023","journal-title":"Vidhyayana-An International Multidisciplinary Peer-Reviewed E-Journal-ISSN 2454-8596"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEM51511.2021.9445355"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.17576\/apjitm-2022-1101-03"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3390\/app12136702"},{"article-title":"Buffer overflows attacks & defense","year":"2020","author":"Harbola","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.31033\/ijemr.13.2.38"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-021-00659-1"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4448543"}],"event":{"name":"2023 5th International Conference on Pattern Analysis and Intelligent Systems (PAIS)","start":{"date-parts":[[2023,10,25]]},"location":"S\u00e9tif, Algeria","end":{"date-parts":[[2023,10,26]]}},"container-title":["2023 5th International Conference on Pattern Analysis and Intelligent Systems (PAIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10321956\/10321971\/10322004.pdf?arnumber=10322004","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T21:11:11Z","timestamp":1709413871000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10322004\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,25]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/pais60821.2023.10322004","relation":{},"subject":[],"published":{"date-parts":[[2023,10,25]]}}}