Issues and challenges in cloud storage architecture: a survey

A Ghani, A Badshah, S Jan, AA Alshdadi… - arxiv preprint arxiv …, 2020 - arxiv.org
From home appliances to industrial enterprises, the Information and Communication
Technology (ICT) industry is revolutionizing the world. We are witnessing the emergence of …

Lightweight cryptographic protocols for IoT-constrained devices: A survey

MN Khan, A Rao, S Camtepe - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is an emergent and evolving technology, interconnecting the cyber
and physical worlds. IoT technology finds applications in a broad spectrum of areas such as …

BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem

K Awuson-David, T Al-Hadhrami, M Alazab… - Future Generation …, 2021 - Elsevier
Log files are the primary source of recording users, applications and protocols, activities in
the cloud ecosystem. Cloud forensic investigators can use log evidence to ascertain when …

Internet of cloud: Security and privacy issues

A Cook, M Robinson, MA Ferrag, LA Maglaras… - Cloud Computing for …, 2018 - Springer
The synergy between Cloud and IoT has emerged largely due to the Cloud having attributes
which directly benefit IoT and enable its continued growth. IoT adopting Cloud services has …

Fault tolerance and resilience in cloud computing environments

R Jhawar, V Piuri - Computer and information security handbook, 2017 - Elsevier
The increasing demand for flexibility and scalability in dynamically obtaining and releasing
computing resources in a cost-effective and device-independent manner, and ease in …

Cyber-storms come from clouds: Security of cloud computing in the IoT era

M De Donno, A Giaretta, N Dragoni, A Bucchiarone… - Future Internet, 2019 - mdpi.com
The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is
connected to the Internet, making computing pervasive like never before. This tsunami of …

Agent based information security framework for hybrid cloud computing

MI Tariq - KSII Transactions on Internet and Information Systems …, 2019 - koreascience.kr
In general, an information security approach estimates the risk, where the risk is to occur due
to an unusual event, and the associated consequences for cloud organization. Information …

Towards leakage-resilient fine-grained access control in fog computing

Z Yu, MH Au, Q Xu, R Yang, J Han - Future Generation Computer Systems, 2018 - Elsevier
Fog Computing, a technology that takes advantage of both the paradigms of Cloud
Computing and the Internet of Things, has a great advantage in reducing the communication …

Secure disintegration protocol for privacy preserving cloud storage

BS Rawal, V Vijayakumar, G Manogaran… - Wireless personal …, 2018 - Springer
Cloud service providers offer infrastructure, network services, and software applications in
the cloud. The cloud services are hosted in a data center that can be used by users with the …

Toward security as a service: A trusted cloud service architecture with policy customization

C Huang, W Chen, L Yuan, Y Ding, S Jian… - Journal of Parallel and …, 2021 - Elsevier
With the rise of concerns over security and privacy in the cloud, the “security-on-demand”
service mode dynamically provides cloud customers with trusted computing environments …