Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …
to grow further with the improved technological innovations. However, the associated …
Task scheduling algorithms for energy optimization in cloud environment: a comprehensive review
Cloud computing is very popular because of its unique features such as scalability, elasticity,
on-demand service, and security. A large number of tasks are performed simultaneously in a …
on-demand service, and security. A large number of tasks are performed simultaneously in a …
Data security and privacy-preserving in edge computing paradigm: Survey and open issues
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …
edge of the network, the traditional centralized cloud computing model has come to a …
Blockchain-based public integrity verification for cloud storage against procrastinating auditors
The deployment of cloud storage services has significant benefits in managing data for
users. However, it also causes many security concerns, and one of them is data integrity …
users. However, it also causes many security concerns, and one of them is data integrity …
Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to
prove to a verifier that it is actually storing a data owner's data honestly. To date, a number of …
prove to a verifier that it is actually storing a data owner's data honestly. To date, a number of …
Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems
Remote data integrity checking is of great importance to the security of cloud-based
information systems. Previous works generally assume a trusted third party to oversee the …
information systems. Previous works generally assume a trusted third party to oversee the …
Fog computing micro datacenter based dynamic resource estimation and pricing model for IoT
Pervasive and ubiquitous computing services have recently been under focus of not only the
research community, but developers as well. Prevailing wireless sensor networks (WSNs) …
research community, but developers as well. Prevailing wireless sensor networks (WSNs) …
Security and privacy of smart cities: a survey, research issues and challenges
With recent advances of information and communication technology, smart city has been
emerged as a new paradigm to dynamically optimize the resources in cities and provide …
emerged as a new paradigm to dynamically optimize the resources in cities and provide …
Auditing cache data integrity in the edge computing environment
Edge computing allows app vendors to deploy their applications and relevant data on
distributed edge servers to serve nearby users. Caching data on edge servers can minimize …
distributed edge servers to serve nearby users. Caching data on edge servers can minimize …
Multi-access edge computing architecture, data security and privacy: A review
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to
provide computation, storage, and networking capabilities at the edge of the network in …
provide computation, storage, and networking capabilities at the edge of the network in …