On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Privacy Ensured -Healthcare for Fog-Enhanced IoT Based Applications

R Saha, G Kumar, MK Rai, R Thomas, SJ Lim - IEEE Access, 2019 - ieeexplore.ieee.org
The progress in network technology and hardware in conjunction with the Internet-of-Things
(IoTs) has provided the comfortability for an easier human life at present. Apart from the so …

Security, integrity, and privacy of cloud computing and big data

MS Mushtaq, MY Mushtaq, MW Iqbal… - Security and privacy …, 2022 - taylorfrancis.com
Big data is crucial in the modern world because more datasets are falling in its domain. The
term refers to the enormously growing complex heterogeneous datasets requiring powerful …

Survey of data and storage security in cloud computing

S Rajeswari, R Kalaiselvi - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Data Security and consumer data privacy are the key challenges in cloud computing era.
The appropriateness and privacy of data stored in cloud may be compromised because of …

[HTML][HTML] Identity-as-a-service: An adaptive security infrastructure and privacy-preserving user identity for the cloud environment

TH Vo, W Fuhrmann, KP Fischer-Hellmann, S Furnell - Future Internet, 2019 - mdpi.com
In recent years, enterprise applications have begun to migrate from a local hosting to a cloud
provider and may have established a business-to-business relationship with each other …

Optimal Elliptic Curve Cryptography-Based Effective Approach for Secure Data Storage in Clouds

A Malik, M Aggarwal, B Sharma, A Singh… - International Journal of …, 2020 - igi-global.com
With the rapid development of cloud advancement, a data security challenge has emerged.
In this paper, a technique based on elliptical cryptography and cuckoo search algorithm is …

Cloud attacks and defence mechanism for SaaS: a survey

AH Shaikh, BB Meshram - … Computing and Networking: Proceedings of IC …, 2022 - Springer
Cloud computing systems are the de-facto deployments for any user data and processing
requirements. Due to a wide variety of cloud systems available today, increase in the …

Privacy-preserving user identity in Identity-as-a-Service

TH Vo, W Fuhrmann… - 2018 21st Conference …, 2018 - ieeexplore.ieee.org
In Federated Identity Management, providers from different security domains exchange
messages containing authentication and authorisation credentials of users. As a result, a …

A Related work on secure event logs protection with user identity using privacy preservation for the cloud infrastructure

S MS - … on Computer Communication and Informatics (ICCCI), 2021 - ieeexplore.ieee.org
The cloud infrastructure is not new to the society from past one decade. But even in recent
time, the companies started migrating from local services to cloud services for better …

Comparative analysis of different symmetric encryption techniques based on computation time

N Agnihotri, AK Sharma - 2020 sixth international conference …, 2020 - ieeexplore.ieee.org
Lately the trend of the internet is taking a front seat for different applications. Organizations
are collecting and processing and then sharing the data using the internet. Sharing using …