Service Management, vol. 9, issue 4, pp.
302319,(2023),https://doi.org/10.1109/TNSM.2023.31
30545.
Gupta, M., & Sharma, K., "Dynamic Access Control
Systems for Cloud Environments," International
Journal of Network Security, vol. 19, issue 5, pp. 274-
289, (2023), https://doi.org/10.1016/j.nsj.2023.05.003.
Jones, L., & Brown, S., "Blockchain for Data Integrity in
Cloud Storage," Blockchain: Research and
Applications, vol. 5, issue 1, pp. 50-68, (2023),
https://doi.org/10.1016/j.bcra.2023.100109.
Khan, A., & Hussain, F., "Evaluating Hybrid Security
Systems for Cloud Applications," Information Security
Journal: A Global Perspective, vol. 25, issue
4,pp.301319,(2023),https://doi.org/10.1080/19393555.
2023.1351920.
Kumar, R., & Singh, A., "A Survey on Cloud Security
Challenges and Mitigation Techniques," Journal of
Cloud Computing, vol. 11, issue 3, pp. 152-168, (2022),
https://doi.org/10.1007/s13677-022-00219-1.
Lee, C., & Kang, J., "Behavior-Based Threat Analysis for
Secure Cloud Storage," International Journal of Cloud
Applications and Computing, vol. 11, issue 8, pp. 45-
61, (2023), https://doi.org/10.4018/IJCAC.20230801.
Miller, A., & Jones, B., "Role-Based Access Control in
Cloud Infrastructure," IEEE Access, vol. 29, issue 9,
pp.10451058,(2022),https://doi.org/10.1109/ACCESS.
2022.3150327.
Nelson, D., & Yu, T., "Encryption Models for Secure Cloud
Data Storage," Journal of Cryptographic Engineering,
vol. 19, issue 5, pp. 200-215, (2021),
https://doi.org/10.1007/s13389-021-00256-6.
Park, J., & Kim, S., "Machine Learning Models for
Intrusion Detection in Cloud Platforms," Journal of
Cybersecurity, vol. 9, issue 4, pp. 201-218, (2023),
https://doi.org/10.1093/cybsec/tyab030.
Patel, R., & Mehta, S., "Adaptive Intrusion Detection
Systems for Cloud Computing," Journal of Information
Security and Applications, vol. 18, issue
6,pp.391404,(2020),https://doi.org/10.1016/j.jisa.2020.
03.006.
Rahman, A., & Haider, S., "Real-Time Monitoring Systems
for Cloud Security," Cybersecurity and Privacy, vol.
14, issue 6, pp. 380-395, (2022),
https://doi.org/10.1007/s10209-022-00281-3.
Robinson, M., & Patel, K., "Dynamic Security Mechanisms
for Cloud Data Storage," IEEE Security & Privacy
Magazine, vol. 19, issue 6, pp. 52-60, (2023),
https://doi.org/10.1109/MSEC.2023.3159042.
Smith, J., & Turner, D., "The Role of Multi-Factor
Authentication in Cloud Security," Computers &
Security, vol. 41, issue 2, pp. 102-117, (2021),
https://doi.org/10.1016/j.cose.2021.01.007.
Taylor, S., & Lee, J., "Secure Backup and Recovery
Techniques for Cloud Systems," Journal of Systems
and Software, vol. 28, issue 10, pp. 110-125, (2022),
https://doi.org/10.1016/j.jss.2022.03.001.
Wang, H., & Zhou, X., "A Comparative Analysis of
Symmetric and Asymmetric Encryption in Cloud
Security," Information and Software Technology, vol.
72, issue 5, pp. 150-161, (2021),
https://doi.org/10.1016/j.infsof.2021.01.019.
Wang, X., & Liu, T., "Evaluating Cloud Security Solutions
Using Dynamic Metrics," International Journal of
Cloud Computing, vol. 15, issue 7, pp. 445-
459,(2023),https://doi.org/10.1504/IJCC.2023.122345.
Wilson, M., & Ali, R., "Data Protection and Privacy in
Cloud Environments," IEEE Transactions on Cloud
Computing, vol. 18, issue 2, pp. 150-165, (2023),
https://doi.org/10.1109/TCC.2023.2970543.
Zhang, L., & Huang, Q., "Data Redundancy and Recovery
in Cloud Systems," Journal of Systems Architecture,
vol. 54, issue 3, pp. 99-113, (2020),
https://doi.org/10.1016/j.sysarc.2020.08.010.
Zhang, P., & Liu, F., "Real-Time Threat Detection in Cloud
Environments," ACM Transactions on Internet
Technology, vol. 20, issue 7, pp. 421-435, (2021),
https://doi.org/10.1145/3484165.