Issues and challenges in cloud storage architecture: a survey
From home appliances to industrial enterprises, the Information and Communication
Technology (ICT) industry is revolutionizing the world. We are witnessing the emergence of …
Technology (ICT) industry is revolutionizing the world. We are witnessing the emergence of …
Lightweight cryptographic protocols for IoT-constrained devices: A survey
Internet of Things (IoT) is an emergent and evolving technology, interconnecting the cyber
and physical worlds. IoT technology finds applications in a broad spectrum of areas such as …
and physical worlds. IoT technology finds applications in a broad spectrum of areas such as …
BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem
K Awuson-David, T Al-Hadhrami, M Alazab… - Future Generation …, 2021 - Elsevier
Log files are the primary source of recording users, applications and protocols, activities in
the cloud ecosystem. Cloud forensic investigators can use log evidence to ascertain when …
the cloud ecosystem. Cloud forensic investigators can use log evidence to ascertain when …
Internet of cloud: Security and privacy issues
The synergy between Cloud and IoT has emerged largely due to the Cloud having attributes
which directly benefit IoT and enable its continued growth. IoT adopting Cloud services has …
which directly benefit IoT and enable its continued growth. IoT adopting Cloud services has …
Fault tolerance and resilience in cloud computing environments
The increasing demand for flexibility and scalability in dynamically obtaining and releasing
computing resources in a cost-effective and device-independent manner, and ease in …
computing resources in a cost-effective and device-independent manner, and ease in …
Cyber-storms come from clouds: Security of cloud computing in the IoT era
The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is
connected to the Internet, making computing pervasive like never before. This tsunami of …
connected to the Internet, making computing pervasive like never before. This tsunami of …
Agent based information security framework for hybrid cloud computing
MI Tariq - KSII Transactions on Internet and Information Systems …, 2019 - koreascience.kr
In general, an information security approach estimates the risk, where the risk is to occur due
to an unusual event, and the associated consequences for cloud organization. Information …
to an unusual event, and the associated consequences for cloud organization. Information …
Towards leakage-resilient fine-grained access control in fog computing
Fog Computing, a technology that takes advantage of both the paradigms of Cloud
Computing and the Internet of Things, has a great advantage in reducing the communication …
Computing and the Internet of Things, has a great advantage in reducing the communication …
Secure disintegration protocol for privacy preserving cloud storage
Cloud service providers offer infrastructure, network services, and software applications in
the cloud. The cloud services are hosted in a data center that can be used by users with the …
the cloud. The cloud services are hosted in a data center that can be used by users with the …
Toward security as a service: A trusted cloud service architecture with policy customization
C Huang, W Chen, L Yuan, Y Ding, S Jian… - Journal of Parallel and …, 2021 - Elsevier
With the rise of concerns over security and privacy in the cloud, the “security-on-demand”
service mode dynamically provides cloud customers with trusted computing environments …
service mode dynamically provides cloud customers with trusted computing environments …