A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions

R Khan, P Kumar, DNK Jayakody… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …

Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges

I Indu, PMR Anand, V Bhaskar - Engineering science and technology, an …, 2018 - Elsevier
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …

Attribute based encryption in cloud computing: A survey, gap analysis, and future directions

P Kumar, PJA Alphonse - Journal of Network and Computer Applications, 2018 - Elsevier
Cloud computing facilitates to store and access the data remotely over the internet.
However, storing the data in the untrusted cloud server leads the privacy and access control …

Cloud-based fine-grained health information access control framework for lightweightiot devices with dynamic auditing andattribute revocation

LY Yeh, PY Chiang, YL Tsai… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
The eHealth trend has spread globally. Internet of Things (IoT) devices for medical service
and pervasive Personal Health Information (PHI) systems play important roles in the eHealth …

Blockchain based data integrity verification in P2P cloud storage

D Yue, R Li, Y Zhang, W Tian… - 2018 IEEE 24th …, 2018 - ieeexplore.ieee.org
With the popularity of cloud storage, how to verify the integrity of data on the cloud has
become a challenging problem. Traditional verification framework involves the Third Party …

[PDF][PDF] A classification and characterization of security threats in cloud computing

T Islam, D Manivannan, S Zeadally - Int. J. Next-Gener. Comput, 2016 - researchgate.net
Security and privacy are the most critical issues that need to be addressed in designing a
computing environment that is reliable and trustworthy. Like all other computing paradigms …

A data sharing protocol to minimize security and privacy risks of cloud storage in big data era

S Han, K Han, S Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
A cloud-based big data sharing system utilizes a storage facility from a cloud service
provider to share data with legitimate users. In contrast to traditional solutions, cloud …

An efficient attribute-based hierarchical data access control scheme in cloud computing

H He, L Zheng, P Li, L Deng, L Huang… - Human-centric computing …, 2020 - Springer
Security issues in cloud computing have become a hot topic in academia and industry, and
CP-ABE is an effective solution for managing and protecting data. When data is shared in …

A QoS-driven approach for cloud computing addressing attributes of performance and security

BG Batista, CHG Ferreira, DCM Segura… - Future Generation …, 2017 - Elsevier
In recent years, cloud computing has been one of the most widely discussed topics in the
field of Information Technology. Owing to the popularity of services offered by cloud …