|
References | Overviews | Advantages | Techniques | Years |
|
[45] | The multilayered framework proposed is used to integrate and develop the three security technologies; the bioinformatics service can simulate DNA, genes, tumor, and organs of the human body | It ensures the security and safety of all incoming and outgoing data to the cloud; large datasets can be processed on a cloud system and are beneficial for the velocity and volume of the big data | CCAF version 1.1, firewall, identity management, and encryption structured query language (SQL) are used in this model | 2016 |
|
[46] | This work proposed many modules and algorithms which are implemented at different levels to provide security to the cloud network; different security policies are designed and implemented according to situations | It provides the ability to share the bandwidth efficiently between the two virtual machines | VDC isolation, HTTP, VMs, role-based distributed firewall, and distributed WAF are implemented | 2015 |
|
[47] | The BC technology used cryptographic enforced distributed ledger system for the security assurance in the cloud; it guarantees the data provenance and the vulnerabilities in the cloud; the BWH attack in BC like the distinct pool reward mechanism | The mechanism used for the security of data is highly strong, and for the attackers, it is difficult to attack because attackers must use extra computational power | The BC technology, BWH, crypto-puzzle, and PoW | 2017 |
|
[48] | The trustworthiness of the cloud data is the key parameter along with the user credibility feedback; basic assessment model, Qos-based trust assessment, and covariance mathematical models are used to cloud data; the running time, trustworthiness, and user feedback are calculated | The proposed model is best in terms of users’ data trustful, confidentiality, and consuming less time | Qos-based trust model, mathematical covariance technique, and basic assessment model are used with cloudSim simulation | 2020 |
|