A smartphone perspective on computation offloading—A survey

QH Nguyen, F Dressler - Computer Communications, 2020 - Elsevier
Computation offloading has emerged as one of the promising approaches to address the
issues of restricted resources, leading to poor user experiences on smartphones in terms of …

[HTML][HTML] A cloud-edge based data security architecture for sharing and analysing cyber threat information

DW Chadwick, W Fan, G Costantino… - Future generation …, 2020 - Elsevier
Cyber-attacks affect every aspect of our lives. These attacks have serious consequences,
not only for cyber-security, but also for safety, as the cyber and physical worlds are …

Security and privacy-enhancing multicloud architectures

JM Bohli, N Gruschka, M Jensen… - … on dependable and …, 2013 - ieeexplore.ieee.org
Security challenges are still among the biggest obstacles when considering the adoption of
cloud services. This triggered a lot of research activities, resulting in a quantity of proposals …

Attribute-based storage supporting secure deduplication of encrypted data in cloud

H Cui, RH Deng, Y Li, G Wu - IEEE transactions on big data, 2017 - ieeexplore.ieee.org
Attribute-based encryption (ABE) has been widely used in cloud computing where a data
provider outsources his/her encrypted data to a cloud service provider, and can share the …

Efficient secure similarity computation on encrypted trajectory data

A Liu, K Zhengy, L Liz, G Liu, L Zhao… - 2015 IEEE 31st …, 2015 - ieeexplore.ieee.org
Outsourcing database to clouds is a scalable and cost-effective way for large scale data
storage, management, and query processing. Trajectory data contain rich spatio-temporal …

Implementing secure applications in smart city clouds using microservices

M Krämer, S Frese, A Kuijper - Future Generation Computer Systems, 2019 - Elsevier
Smart Cities make use of ICT technology to address the challenges of modern urban
management. The cloud provides an efficient and cost-effective platform on which they can …

Verifiable encodings for secure homomorphic analytics

S Chatel, C Knabenhans, A Pyrgelis… - arxiv preprint arxiv …, 2022 - arxiv.org
Homomorphic encryption, which enables the execution of arithmetic operations directly on
ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations …

Puppies: Transformation-supported personalized privacy preserving partial image sharing

J He, B Liu, D Kong, X Bao, N Wang… - 2016 46th annual …, 2016 - ieeexplore.ieee.org
Sharing photos through Online Social Networks isan increasingly popular fashion. However,
it poses a seriousthreat to end users as private information in the photos …

A conceptual security framework for cloud computing issues

S Aljawarneh, MB Yassein - Cyber Security and Threats: Concepts …, 2018 - igi-global.com
In this article, perspectives from Cloud computing practitioners are shown in order to
address clients concerns and bring about awareness of the measures that put in place to …

A cloud design for user-controlled storage and processing of sensor data

R Hummen, M Henze, D Catrein… - 4th IEEE International …, 2012 - ieeexplore.ieee.org
Ubiquitous sensing environments such as sensor networks collect large amounts of data.
This data volume is destined to grow even further with the vision of the Internet of Things …