|
References | Overviews | Advantages | Techniques | Years |
|
[67] | Two networks called software-defined network (SDN) and information-centric networking (ICN) are analyzed on the cloud model to secure the data; the ICN is considered the building block of the framework, and SDN decouples the control plane | This flexible infrastructure highly provides data security | Software defines network, and information-centric networking are applied | 2017 |
|
[68] | The private network analyzes the big data to secure the enterprises; different threats on different layers are analyzed and give a solution to each threat; by doing this a secure enterprise Pr network is achieved | The framework gives different solutions for the different threats on five layers, and the Pr becomes more secure and confidential | The big data, key technology, five layers, and antivirus technology | 2018 |
|
[69] | The cloud providers and the users both are responsible to deliver reliable and secure data over the cloud; different security threats and their solutions are analyzed here; the CSP protects the sharing of technology issues; the security provided is architecture and layer base | Highly secure techniques are discussed which fully protects the data on any deployment model | Isolation and segmentation, web browser, service level agreement, two-factor authentication, and many more techniques are used | 2016 |
|
[70] | The leakage and temper of the cloud data is minimized; along with these, the privacy and unauthentic scenarios are being analyzed using a framework called the Auth-privacy chain, a blockchain framework, and enterprise operating system | This proposed framework eliminates the data leakage and temper of data in the cloud system and provides privacy | Blockchain-based access control, the Auth-privacy chain, and enterprise operating system | 2020 |
|