Beyond lightning: A survey on security challenges in cloud computing
Cloud computing is a model to provide convenient, on-demand access to a shared pool
configurable computing resources. In cloud computing, IT-related capabilities are provided …
configurable computing resources. In cloud computing, IT-related capabilities are provided …
Efficient data security using hybrid cryptography on cloud computing
P Chinnasamy, S Padmavathi, R Swathy… - … : Proceedings of ICICCT …, 2021 - Springer
Services are distributed among all servers and between the users and individuals in the
cloud environment. Cloud providers have trouble guaranteeing file protection as security is …
cloud environment. Cloud providers have trouble guaranteeing file protection as security is …
A framework for collaborative learning in secure high-dimensional space
As the amount of data generated by the Internet of the Things (IoT) devices keeps
increasing, many applications need to offload computation to the cloud. However, it often …
increasing, many applications need to offload computation to the cloud. However, it often …
Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds
Outsourcing data to the cloud are beneficial for reasons of economy, scalability, and
accessibility, but significant technical challenges remain. Sensitive data stored in the cloud …
accessibility, but significant technical challenges remain. Sensitive data stored in the cloud …
Secure Data Sharing in Cloud Computing: A Comprehensive Survey of Two-Factor Authentication and Cryptographic Solutions.
S Gadde, GS Rao, VS Veesam… - … des Systèmes d' …, 2023 - search.ebscohost.com
Cloud computing has emerged as a pivotal trend across both commercial and academic
sectors, offering substantial storage capabilities to service providers and end-users …
sectors, offering substantial storage capabilities to service providers and end-users …
In the mood for being influential on twitter
Researchers have widely studied how information diffuses in Twitter and have often done so
by modeling the social-networking site as a communication graph in which tweets spread …
by modeling the social-networking site as a communication graph in which tweets spread …
CADF-CSE: Chaotic map-based authenticated data access/sharing framework for IoT-enabled cloud storage environment
Data is an essential asset of an organization or individual in this information age. Secure
and resource-efficient data communication has become paramount in the IoT-enabled cloud …
and resource-efficient data communication has become paramount in the IoT-enabled cloud …
Secure credentials control method
TD Selgas, J Cutrer - US Patent 10,055,595, 2018 - Google Patents
Methods, apparatus, and systems are provided to secure access to an account of a user.
The account may have a system administrator. The user may have a credential for accessing …
The account may have a system administrator. The user may have a credential for accessing …
Enabling secure multitenancy in cloud computing: Challenges and approaches
Cloud computing provides a multitenant feature that enables an IT asset to host multiple
tenants, improving its utilization rate. The feature provides economic benefits to both users …
tenants, improving its utilization rate. The feature provides economic benefits to both users …
Cross-layer design for secure and resilient cyber-physical systems
This book presents control and game-theoretic tools to design secure and resilient cyber-
physical systems, including cloud-enabled control systems, 3D printers, robotic systems, and …
physical systems, including cloud-enabled control systems, 3D printers, robotic systems, and …