A smartphone perspective on computation offloading—A survey
QH Nguyen, F Dressler - Computer Communications, 2020 - Elsevier
Computation offloading has emerged as one of the promising approaches to address the
issues of restricted resources, leading to poor user experiences on smartphones in terms of …
issues of restricted resources, leading to poor user experiences on smartphones in terms of …
[HTML][HTML] A cloud-edge based data security architecture for sharing and analysing cyber threat information
Cyber-attacks affect every aspect of our lives. These attacks have serious consequences,
not only for cyber-security, but also for safety, as the cyber and physical worlds are …
not only for cyber-security, but also for safety, as the cyber and physical worlds are …
Security and privacy-enhancing multicloud architectures
Security challenges are still among the biggest obstacles when considering the adoption of
cloud services. This triggered a lot of research activities, resulting in a quantity of proposals …
cloud services. This triggered a lot of research activities, resulting in a quantity of proposals …
Attribute-based storage supporting secure deduplication of encrypted data in cloud
Attribute-based encryption (ABE) has been widely used in cloud computing where a data
provider outsources his/her encrypted data to a cloud service provider, and can share the …
provider outsources his/her encrypted data to a cloud service provider, and can share the …
Efficient secure similarity computation on encrypted trajectory data
Outsourcing database to clouds is a scalable and cost-effective way for large scale data
storage, management, and query processing. Trajectory data contain rich spatio-temporal …
storage, management, and query processing. Trajectory data contain rich spatio-temporal …
Implementing secure applications in smart city clouds using microservices
Smart Cities make use of ICT technology to address the challenges of modern urban
management. The cloud provides an efficient and cost-effective platform on which they can …
management. The cloud provides an efficient and cost-effective platform on which they can …
Verifiable encodings for secure homomorphic analytics
Homomorphic encryption, which enables the execution of arithmetic operations directly on
ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations …
ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations …
Puppies: Transformation-supported personalized privacy preserving partial image sharing
Sharing photos through Online Social Networks isan increasingly popular fashion. However,
it poses a seriousthreat to end users as private information in the photos …
it poses a seriousthreat to end users as private information in the photos …
A conceptual security framework for cloud computing issues
S Aljawarneh, MB Yassein - Cyber Security and Threats: Concepts …, 2018 - igi-global.com
In this article, perspectives from Cloud computing practitioners are shown in order to
address clients concerns and bring about awareness of the measures that put in place to …
address clients concerns and bring about awareness of the measures that put in place to …
A cloud design for user-controlled storage and processing of sensor data
Ubiquitous sensing environments such as sensor networks collect large amounts of data.
This data volume is destined to grow even further with the vision of the Internet of Things …
This data volume is destined to grow even further with the vision of the Internet of Things …