Agapito, G., & Cannataro, M. (2023, June 1). An
Overview on the Challenges and
Limitations Using Cloud Computing in
Healthcare Corporations. Big Data and
Cognitive Computing. MDPI.
https://doi.org/10.3390/bdcc7020068
Al-Ghuwairi, AR., Sharrab, Y., Al-Fraihat, D. et
al. Intrusion detection in cloud computing
based on time series anomalies utilizing
machine learning. J Cloud Comp 12, 127
(2023). https://doi.org/10.1186/s13677-
023-00491-x
Alshayeji, M. H., & Abed, S. (2022). Enhanced
video-on-demand security in cloud
computing against insider and outsider
threats. International Journal of Security
and Networks, 17(1), 48–55.
https://doi.org/10.1504/IJSN.2022.122550.
Amardeep Kaur, Amandeep Verma (2023).
Adaptive Access Control Mechanism
(AACM) for Enterprise Cloud Computing.
Journal of Electrical and Computer
Engineering,
https://doi.org/10.1155/2023/3922393.
Blanco, D. F., Le Mouel, F., Lin, T., & Escudie,
M. P. (2023). A Comprehensive Survey on
Software as a Service (SaaS)
Transformation for the Automotive
Systems. IEEE Access, 11, 73688–73753.
https://doi.org/10.1109/ACCESS.2023.329
4256.
Bhamare, D., Salman, T., Samaka, M., Erbad, A.,
& Jain, R. (2017). Feasibility of Supervised
Machine Learning for Cloud Security. In
ICISS 2016 - 2016 International
Conference on Information Science and
Security. Institute of Electrical and
Electronics Engineers Inc.
https://doi.org/10.1109/ICISSEC.2016.788
5853.
Carmen Pérez Rodrigo (2012).“Las revisiones
sistemáticas: declaración PRISMA”.
Consultado de
https://renc.es/imagenes/auxiliar/files/Nutr
_1-2012%20Taller%20escritura.pdf.
F. Nadeem, "Evaluating and Ranking Cloud
IaaS, PaaS and SaaS Models Based on
Functional and Non-Functional Key
Performance Indicators," in IEEE Access,
vol. 10, pp. 63245-63257, 2022, doi:
10.1109/ACCESS.2022.3182688.
Goyal, P., & Deora, S. S. (2022). Trust
Management Techniques and their
Challenges in Cloud Computing: A Review.
International Journal of Computer
Networks and Applications, 9(6), 761–774.
https://doi.org/10.22247/ijcna/2022/21770
8.
Malkawi, A. R., Bakar, M. S. A., & Dahlin, Z.
M. (2023). Cloud computing virtual
learning environment: issues and
challenges. Indonesian Journal of
Electrical Engineering and Computer
Science, 30(3), 1707–1712.
https://doi.org/10.11591/ijeecs.v30.i3.pp17
07-1712.
Mohammed, S., Nanthini, S., Krishna, N. B.,
Srinivas, I., Rajagopal, M., & Kumar, M. A.
(2023). A new lightweight data security
system for data security in the cloud
computing. Measurement: Sensors, 29,
100856.
https://doi.org/10.1016/j.measen.2023.100
856.
Mohammed, C. M., & Zeebaree, S. R. (2021).
Sufficient comparison among cloud
computing services: IaaS, PaaS, and SaaS:
A review. International Journal of Science
and Business, 5(2), 17-30.
Mustafa Mohammed, C., & M Zeebaree, S. R.
(2021). Sufficient Comparison Among
Cloud Computing Services: IaaS, PaaS,
and SaaS: A Review. International Journal
of Science and Business, 5(2), 17–30.
Prasad, S. N., & Rekha, C. (2023). Block chain
based IAS protocol to enhance security and
privacy in cloud computing. Measurement:
Sensors, 28, 100813.
https://doi.org/10.1016/j.measen.2023.100
813.
Rodriguez Baca, L. S., Cruzado Puente de la
Vega, C. F., Mejía Corredor, C., & Diaz, M.
A. A. (2020). Aplicación de ISO 27001 y su
influencia en la seguridad de la
información de una empresa privada
peruana. Propósitos y Representaciones,
8(3).
Sandhu, A. K. (2022). Big Data with Cloud
Computing: Discussions and Challenges.
Big Data Mining and Analytics, 5(1).
https://doi.org/10.26599/BDMA.2021.902
0016.
Soveizi, N., Türkmen, F., & Karastoyanova, D.
(2023b). Security and privacy concerns in
cloud-based scientific and business
workflows: A Systematic review. Future
Generation Computer Systems, 148, 184-