Security and privacy protection in cloud computing: Discussions and challenges
PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …
prominent, which is of concern to industry and academia. We review the research progress …
Security in cloud computing: Opportunities and challenges
The cloud computing exhibits, remarkable potential to provide cost effective, easy to
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …
A conceptual framework to support digital transformation in manufacturing using an integrated business process management approach
J Butt - Designs, 2020 - mdpi.com
Digital transformation is no longer a future trend, as it has become a necessity for
businesses to grow and remain competitive in the market. The fourth industrial revolution …
businesses to grow and remain competitive in the market. The fourth industrial revolution …
Frequency-tuned salient region detection
Detection of visually salient image regions is useful for applications like object
segmentation, adaptive compression, and object recognition. In this paper, we introduce a …
segmentation, adaptive compression, and object recognition. In this paper, we introduce a …
A unified architectural approach for cyberattack-resilient industrial control systems
With the rapid development of functional requirements in the emerging Industry 4.0 era,
modern industrial control systems (ICSs) are no longer isolated islands, making them more …
modern industrial control systems (ICSs) are no longer isolated islands, making them more …
From security to assurance in the cloud: A survey
The cloud computing paradigm has become a mainstream solution for the deployment of
business processes and applications. In the public cloud vision, infrastructure, platform, and …
business processes and applications. In the public cloud vision, infrastructure, platform, and …
A study on data storage security issues in cloud computing
BT Rao - Procedia Computer Science, 2016 - Elsevier
Cloud computing is a revolutionary mechanism that changing way to enterprise hardware
and software design and procurements. Because of cloud simplicity everyone is moving …
and software design and procurements. Because of cloud simplicity everyone is moving …
Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things
Fog computing is a paradigm that extends cloud computing to the edge of the network. It can
provide computation and storage services to end devices in Internet of Things (IoT). Attribute …
provide computation and storage services to end devices in Internet of Things (IoT). Attribute …
Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
For realizing the flexible, scalable and fuzzy fine-grained access control, ciphertext policy
attribute-based encryption (CP-ABE) scheme has been widely used in the cloud storage …
attribute-based encryption (CP-ABE) scheme has been widely used in the cloud storage …
Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry
As one of the most significant issues in the financial industry, customers' privacy information
protection has been considered a challenging research over years. The constant …
protection has been considered a challenging research over years. The constant …