Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Leading SCIE and SCOPUS Indexed Journals in Cloud Security

Leading SCIE and SCOPUS Indexed Journals in Cloud Security

Leading SCIE and SCOPUS Indexed Journals in Cloud Security

  • In the massive flux of cloud data, security is a major concern to prevent threats from attackers/intruders. Users accessed cloud-based services via web browsers; thus, all web-based attacks are highly prevalent in a cloud environment because it greatly impacts the contents of user files, databases, virtual machine, and metadata.In recent years, cloud computing and related security issues have become a highly debated topic.

  • To evaluate the cloud system, security, confidentiality, integrity, and availability factors are necessary. Significant research techniques and numerous journals introduced various ways to prevent or detect attacks and security gaps on the cloud.

  • This list provides top-rank journals in cloud security from leading publishers in the research field with high impact factor, cite score, scientific journal rank (SJR), and H-Index.

  • General Scope and Topics Coverage of Cloud Security Journals

    • Cloud Computing Standards and Compliance - Intrusion Detection and Prevention in Cloud - Machine Learning Solutions for Cloud Security - Deep Learning Solutions for Cloud Security - Security for Anonymous Data Sharing in Cloud - Encryption and Key Management in Cloud Computing

    • Distributed Authentication and Authentication in Cloud Computing - Distributed Authentication and Authentication in Cloud Computing - Data Confidentiality in Cloud Security - Data Integrity and Availability in Cloud Security - Virtualization Security in Cloud Computing

    • Confidentiality and Integrity of Virtualization in Cloud Computing- Security Management in Cloud Computing - Log Security in Cloud - Real-time Analysis of Security Log Data for Alert Generation in Cloud - Intrusion Detection System with Event Logging in Cloud

    • Security Monitoring for Virtual Machines in Cloud - Secure Data Segregation and Isolation in Cloud - Efficient Searchable Data Encryption in Cloud Storage - Cryptography and Access Control based Secure Storage in Cloud - Secure Data Forwarding in Cloud Storage

    • Privacy Preservation in Public Auditing of Cloud Storage - Privacy Preservation in Cloud - Key Exchange Privacy Preservation for Cloud - Data Mining Techniques for Privacy Preservation - Machine Learning-based Privacy Preservation in Cloud - Risk Assessment and Risk Management in Cloud

    • Multi-Cloud Security Provisioning - Identity Management and Multi-factor Authentication in Cloud - Access Control Mechanisms in Cloud - Access Control Governance in Cloud - Security Threats in Cloud - Security for Cloud Infrastructure and Services

    • Blockchain Technology for Cloud Security - Secure Outsourcing of Big Data in Cloud - Cloud Reliability Analysis - Reliable VM Management in Cloud - Artificial Intelligence for Cloud Reliability - Cryptographic Protocols against Internal Attacks - Secure Cryptographic Cloud Communication

    • Security Solutions for Cloud attacks - Security Solutions for Denial-of-Service Attacks in Cloud - Security Solutions for Man-in-the-Middle Attacks in Cloud - Forensic Techniques in Cloud Computing - Anti Forensic Techniques in Cloud Computing

    • Distributed Authentication and Authorization in Cloud Computing - Cryptography and Key Management Strategies in Cloud Computing - Efficient Searchable Data Encryption in Mobile Cloud Storage - Anonymous Data Sharing in Cloud Computing

    • Real-time Analysis of Security Log Data for Alert generation on Cloud Environment - Security monitoring for Virtual Machines in Cloud Computing - Reliable Virtual-Machine Management System for the Cloud

    List of High Impact Factor Cloud Security Journals