Beyond lightning: A survey on security challenges in cloud computing

C Rong, ST Nguyen, MG Jaatun - Computers & Electrical Engineering, 2013 - Elsevier
Cloud computing is a model to provide convenient, on-demand access to a shared pool
configurable computing resources. In cloud computing, IT-related capabilities are provided …

Efficient data security using hybrid cryptography on cloud computing

P Chinnasamy, S Padmavathi, R Swathy… - … : Proceedings of ICICCT …, 2021 - Springer
Services are distributed among all servers and between the users and individuals in the
cloud environment. Cloud providers have trouble guaranteeing file protection as security is …

A framework for collaborative learning in secure high-dimensional space

M Imani, Y Kim, S Riazi, J Messerly… - 2019 IEEE 12th …, 2019 - ieeexplore.ieee.org
As the amount of data generated by the Internet of the Things (IoT) devices keeps
increasing, many applications need to offload computation to the cloud. However, it often …

Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds

PK Tysowski, MA Hasan - IEEE Transactions on Cloud …, 2013 - ieeexplore.ieee.org
Outsourcing data to the cloud are beneficial for reasons of economy, scalability, and
accessibility, but significant technical challenges remain. Sensitive data stored in the cloud …

Secure Data Sharing in Cloud Computing: A Comprehensive Survey of Two-Factor Authentication and Cryptographic Solutions.

S Gadde, GS Rao, VS Veesam… - … des Systèmes d' …, 2023 - search.ebscohost.com
Cloud computing has emerged as a pivotal trend across both commercial and academic
sectors, offering substantial storage capabilities to service providers and end-users …

In the mood for being influential on twitter

D Quercia, J Ellis, L Capra… - 2011 IEEE third …, 2011 - ieeexplore.ieee.org
Researchers have widely studied how information diffuses in Twitter and have often done so
by modeling the social-networking site as a communication graph in which tweets spread …

CADF-CSE: Chaotic map-based authenticated data access/sharing framework for IoT-enabled cloud storage environment

M Tanveer, AK Bashir, BA Alzahrani, A Albeshri… - Physical …, 2023 - Elsevier
Data is an essential asset of an organization or individual in this information age. Secure
and resource-efficient data communication has become paramount in the IoT-enabled cloud …

Secure credentials control method

TD Selgas, J Cutrer - US Patent 10,055,595, 2018 - Google Patents
Methods, apparatus, and systems are provided to secure access to an account of a user.
The account may have a system administrator. The user may have a credential for accessing …

Enabling secure multitenancy in cloud computing: Challenges and approaches

T Takahashi, G Blanc, Y Kadobayashi… - 2012 2nd Baltic …, 2012 - ieeexplore.ieee.org
Cloud computing provides a multitenant feature that enables an IT asset to host multiple
tenants, improving its utilization rate. The feature provides economic benefits to both users …

Cross-layer design for secure and resilient cyber-physical systems

Q Zhu, Z Xu - Cham, Switzerland: Springer, 2020 - Springer
This book presents control and game-theoretic tools to design secure and resilient cyber-
physical systems, including cloud-enabled control systems, 3D printers, robotic systems, and …