Privacy preservation models for third-party auditor over cloud computing: A survey

A Razaque, MBH Frej, B Alotaibi, M Alotaibi - Electronics, 2021 - mdpi.com
Cloud computing has become a prominent technology due to its important utility service; this
service concentrates on outsourcing data to organizations and individual consumers. Cloud …

A study of moving from cloud computing to fog computing

HR Abdulqadir, SRM Zeebaree… - Qubahan Academic …, 2021 - journal.qubahan.com
The exponential growth of the Internet of Things (IoT) technology poses various challenges
to the classic centralized cloud computing paradigm, including high latency, limited capacity …

Futuristic Cyber‐Twin Architecture for 6G Technology to Support Internet of Everything

S Juneja, M Gahlan, G Dhiman… - Scientific …, 2021 - Wiley Online Library
With the rapid growth of Internet of Everything, there is a huge rise in the transportable
Internet traffic due to which its associated resources have exceptional obstacles which …

Data security in cloud computing using AES under HEROKU cloud

BH Lee, EK Dewi, MF Wajdi - 2018 27th wireless and optical …, 2018 - ieeexplore.ieee.org
Cloud security is an evolving sub-domain of computer and network security. Cloud platform
utilizes third-party data centers model. An example of cloud platform as a service (PaaS) is …

Securing data and preserving privacy in cloud IoT-based technologies an analysis of assessing threats and develo** effective safeguard

M Pathak, KN Mishra, SP Singh - Artificial Intelligence Review, 2024 - Springer
Abstract The Internet of Things (IoT) is a powerful technology adopted in various industries.
Applications of the IoT aim to enhance automation, productivity, and user comfort in a cloud …

Detection and prevention mechanisms for ddos attack in cloud computing environment

S Potluri, M Mangla, S Satpathy… - 2020 11th international …, 2020 - ieeexplore.ieee.org
For optimal use of cloud resources and to reduce the latency of cloud users, the cloud
computing model extends the services such as networking facilities, computational …

[PDF][PDF] Cloud computing security challenges in higher educational institutions-A survey

HAK Al-Shqeerat, FM Al-Shrouf… - … Journal of Computer …, 2017 - researchgate.net
Cloud Computing Security Challenges in Higher Educational Institutions - A Survey Page 1
International Journal of Computer Applications (0975 – 8887) Volume 161 – No 6, March 2017 …

A framework for critical security factors that influence the decision of cloud adoption by Saudi government agencies

MO Alassafi, A Alharthi, RJ Walters, GB Wills - Telematics and Informatics, 2017 - Elsevier
Cloud computing technologies can play an essential role in public organisations and
companies while it reduces the cost of using information technology services. It allows users …

Analytical review of data security in cloud computing

M Joshi, S Budhani, N Tewari… - 2021 2nd International …, 2021 - ieeexplore.ieee.org
All the organization wants to implement the same security parameters as they are already
using with their internal data/resources. It is mandatory to understand and find the data …

From cloud computing security towards homomorphic encryption: A comprehensive review

SJ Mohammed, DB Taha - … Computing Electronics and Control …, 2021 - telkomnika.uad.ac.id
Abstract “Cloud computing” is a new technology that revolutionized the world of
communications and information technologies. It collects a large number of possibilities …