Security issues in cloud environments: a survey

DAB Fernandes, LFB Soares, JV Gomes… - International journal of …, 2014 - Springer
In the last few years, the appealing features of cloud computing have been fueling the
integration of cloud environments in the industry, which has been consequently motivating …

A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends

F Zafar, A Khan, SUR Malik, M Ahmed, A Anjum… - Computers & …, 2017 - Elsevier
Cloud computing has gained tremendous popularity in recent years. By outsourcing
computation and storage requirements to public providers and paying for the services used …

Multi-tenancy in cloud computing

H AlJahdali, A Albatli, P Garraghan… - 2014 IEEE 8th …, 2014 - ieeexplore.ieee.org
As Cloud Computing becomes the trend of information technology computational model, the
Cloud security is becoming a major issue in adopting the Cloud where security is …

[HTML][HTML] Emerging issues & challenges in cloud computing—a hybrid approach

Y Ghanam, J Ferreira, F Maurer - 2012 - scirp.org
As cloud computing continues to gain more momentum in the IT industry, more issues and
challenges are being reported by academics and practitioners. In this paper, we aim to attain …

In cloud we trust: Risk-Assessment-as-a-Service

M Theoharidou, N Tsalis, D Gritzalis - Trust Management VII: 7th IFIP WG …, 2013 - Springer
Cloud computing is an emerging paradigm that allows adoption of on-demand services in a
cost-effective way. Migrating services to the Cloud also means been exposed to new threats …

Security as a service platform leveraging multi-access edge computing infrastructure provisions

P Ranaweera, VN Imrith, M Liyanag… - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
The mobile service platform envisaged by emerging IoT and 5G is guaranteeing gigabit-
level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. In …

A deterministic approach to blind symbol estimation

H Liu, G Xu - Proceedings of 1994 28th Asilomar Conference …, 1994 - ieeexplore.ieee.org
A blind symbol estimation technique for digital communications is developed by exploiting
special data structure of the oversampled channel output. The proposed method achieves …

A multi-layer security model for 5g-enabled industrial internet of things

H Al-Aqrabi, AP Johnson, R Hill, P Lane… - Smart City and …, 2019 - Springer
This article considers the need for secure communications between Industrial Internet of
Things (IIoT) devices that operate in 5G-enabled environments. 5G networks enable greater …

[HTML][HTML] Managing security evidence in safety-critical organizations

M Mohamad, JP Steghöfer, E Knauss… - Journal of Systems and …, 2024 - Elsevier
With the increasing prevalence of open and connected products, cybersecurity has become
a serious issue in safety-critical domains such as the automotive industry. As a result …

A load-balancing approach using an improved simulated annealing algorithm

M Hanine, EH Benlahmar - Journal of Information Processing …, 2020 - koreascience.kr
Cloud computing is an emerging technology based on the concept of enabling data access
from anywhere, at any time, from any platform. The exponential growth of cloud users has …