Security and privacy in cloud computing: technical review

YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …

A survey of computation offloading for mobile systems

K Kumar, J Liu, YH Lu, B Bhargava - Mobile networks and Applications, 2013 - Springer
Mobile systems have limited resources, such as battery life, network bandwidth, storage
capacity, and processor performance. These restrictions may be alleviated by computation …

Security and privacy in cloud computing

Z **ao, Y **ao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …

Attribute-based access control with efficient revocation in data outsourcing systems

J Hur, DK Noh - IEEE Transactions on Parallel and Distributed …, 2010 - ieeexplore.ieee.org
Some of the most challenging issues in data outsourcing scenario are the enforcement of
authorization policies and the support of policy updates. Ciphertext-policy attribute-based …

Health fog: a novel framework for health and wellness applications

M Ahmad, MB Amin, S Hussain, BH Kang… - The Journal of …, 2016 - Springer
In the past few years the role of e-health applications has taken a remarkable lead in terms
of services and features inviting millions of people with higher motivation and confidence to …

Secure and efficient access to outsourced data

W Wang, Z Li, R Owens, B Bhargava - … of the 2009 ACM workshop on …, 2009 - dl.acm.org
Providing secure and efficient access to large scale outsourced data is an important
component of cloud computing. In this paper, we propose a mechanism to solve this …

Attributed-based access control for multi-authority systems in cloud storage

K Yang, X Jia - 2012 IEEE 32nd International Conference on …, 2012 - ieeexplore.ieee.org
Cipher text-Policy Attribute-base Encryption (CP-ABE) is regarded as one of the most
suitable technologies for data access control in cloud storage. In almost all existing CP-ABE …

Trust enhanced cryptographic role-based access control for secure cloud data storage

L Zhou, V Varadharajan… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Cloud data storage has provided significant benefits by allowing users to store massive
amount of data on demand in a cost-effective manner. To protect the privacy of data stored in …

Data and infrastructure security auditing in cloud computing environments

H Rasheed - International Journal of Information Management, 2014 - Elsevier
For many companies the remaining barriers to adopting cloud computing services are
related to security. One of these significant security issues is the lack of auditability for …

[PDF][PDF] Capability-based cryptographic data access control in cloud computing

C Hota, S Sanka, M Rajarajan… - International Journal of …, 2011 - researchgate.net
-------------------------------------------------------------------ABSTRACT-------------------------------------------
-----------------------Cloud computing has emerged as a popular model in computing world to …