A systematic literature review on cloud computing security: threats and mitigation strategies

B Alouffi, M Hasnain, A Alharbi, W Alosaimi… - Ieee …, 2021 - ieeexplore.ieee.org
Cloud computing has become a widely exploited research area in academia and industry.
Cloud computing benefits both cloud services providers (CSPs) and consumers. The …

Cloud digital forensics: Beyond tools, techniques, and challenges

AW Malik, DS Bhatti, TJ Park, HU Ishtiaq, JC Ryou… - Sensors, 2024 - mdpi.com
Cloud computing technology is rapidly becoming ubiquitous and indispensable. However,
its widespread adoption also exposes organizations and individuals to a broad spectrum of …

A Fuzzy-AHP based prioritization of trust criteria in fog computing services

SO Ogundoyin, IA Kamil - Applied Soft Computing, 2020 - Elsevier
Fog computing is a new promising paradigm that is capable of addressing the problems with
the traditional cloud computing. However, prior to the development of this qualifiedly roseate …

Enhancing cloud security—proactive threat monitoring and detection using a siem-based approach

E Tuyishime, TC Balan, PA Cotfas, DT Cotfas… - Applied Sciences, 2023 - mdpi.com
With the escalating frequency of cybersecurity threats in public cloud computing
environments, there is a pressing need for robust security measures to safeguard sensitive …

Confimizer: A novel algorithm to optimize cloud resource by confidentiality-cost trade-off using bilstm network

S Achar, N Faruqui, A Bodepudi, M Reddy - IEEE Access, 2023 - ieeexplore.ieee.org
The world is expiring a 23% annual data growth rate and is projected to have a total surplus
volume of 175 Zettabytes by 2025. It imposes significant challenges for small to medium …

DNA-chaos governed cryptosystem for cloud-based medical image repository

N Chidambaram, K Thenmozhi, P Raj… - Cluster Computing, 2024 - Springer
Nowadays, digital medical images have become an essential source for the grand success
of e-health technology. At the same time, the massive storage also plays a vital role. One of …

An efficient framework for trust evaluation of secure service selection in fog computing based on QoS, reputation, and social criteria

M Afzali, H Pourmohammadi… - Computing, 2022 - Springer
Fog computing has been recognized as a new paradigm of distributed environment which is
the result of cloud computing extension. Fog layer is located between cloud data center …

Proofs of retrievability with tag outsourcing based on Goppa codes

S Ji, W Zhou, C Ma, D Li, K Zhu, L Fang - Computer Standards & Interfaces, 2023 - Elsevier
In cloud storage, because the data owner loses the physical control of the data, the data may
be tampered with or deleted. Although, it has been proposed to adopt provable data …

Survey on Cloud Auditing by Using Integrity Checking Algorithm and Key Validation Mechanism

M Mageshwari, R Naresh - Smart Trends in Computing and …, 2022 - Springer
Cloud computing can be used to access and storing data and delivery of different services
over the internet. Using cloud storage, users can remotely store their data. Cloud service …

RDF query path optimization using hybrid genetic algorithms: Semantic web vs. data-intensive cloud computing

QM Ilyas, M Ahmad, S Rauf, D Irfan - International Journal of Cloud …, 2022 - igi-global.com
Abstract Resource Description Framework (RDF) inherently supports data mergers from
various resources into a single federated graph that can become very large even for an …