Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

Security in cloud computing: Opportunities and challenges

M Ali, SU Khan, AV Vasilakos - Information sciences, 2015 - Elsevier
The cloud computing exhibits, remarkable potential to provide cost effective, easy to
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …

A conceptual framework to support digital transformation in manufacturing using an integrated business process management approach

J Butt - Designs, 2020 - mdpi.com
Digital transformation is no longer a future trend, as it has become a necessity for
businesses to grow and remain competitive in the market. The fourth industrial revolution …

Frequency-tuned salient region detection

R Achanta, S Hemami, F Estrada… - 2009 IEEE conference …, 2009 - ieeexplore.ieee.org
Detection of visually salient image regions is useful for applications like object
segmentation, adaptive compression, and object recognition. In this paper, we introduce a …

A unified architectural approach for cyberattack-resilient industrial control systems

C Zhou, B Hu, Y Shi, YC Tian, X Li… - Proceedings of the …, 2020 - ieeexplore.ieee.org
With the rapid development of functional requirements in the emerging Industry 4.0 era,
modern industrial control systems (ICSs) are no longer isolated islands, making them more …

From security to assurance in the cloud: A survey

CA Ardagna, R Asal, E Damiani, QH Vu - ACM Computing Surveys …, 2015 - dl.acm.org
The cloud computing paradigm has become a mainstream solution for the deployment of
business processes and applications. In the public cloud vision, infrastructure, platform, and …

A study on data storage security issues in cloud computing

BT Rao - Procedia Computer Science, 2016 - Elsevier
Cloud computing is a revolutionary mechanism that changing way to enterprise hardware
and software design and procurements. Because of cloud simplicity everyone is moving …

Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things

Q Huang, Y Yang, L Wang - IEEE Access, 2017 - ieeexplore.ieee.org
Fog computing is a paradigm that extends cloud computing to the edge of the network. It can
provide computation and storage services to end devices in Internet of Things (IoT). Attribute …

Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage

H Zhong, W Zhu, Y Xu, J Cui - Soft Computing, 2018 - Springer
For realizing the flexible, scalable and fuzzy fine-grained access control, ciphertext policy
attribute-based encryption (CP-ABE) scheme has been widely used in the cloud storage …

Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry

M Qiu, K Gai, B Thuraisingham, L Tao… - Future generation …, 2018 - Elsevier
As one of the most significant issues in the financial industry, customers' privacy information
protection has been considered a challenging research over years. The constant …