On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Task scheduling algorithms for energy optimization in cloud environment: a comprehensive review

R Ghafari, FH Kabutarkhani, N Mansouri - Cluster Computing, 2022 - Springer
Cloud computing is very popular because of its unique features such as scalability, elasticity,
on-demand service, and security. A large number of tasks are performed simultaneously in a …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

Blockchain-based public integrity verification for cloud storage against procrastinating auditors

Y Zhang, C Xu, X Lin, X Shen - IEEE Transactions on Cloud …, 2019 - ieeexplore.ieee.org
The deployment of cloud storage services has significant benefits in managing data for
users. However, it also causes many security concerns, and one of them is data integrity …

Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage

Y Yu, MH Au, G Ateniese, X Huang… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to
prove to a verifier that it is actually storing a data owner's data honestly. To date, a number of …

Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems

Q Zhao, S Chen, Z Liu, T Baker, Y Zhang - Information Processing & …, 2020 - Elsevier
Remote data integrity checking is of great importance to the security of cloud-based
information systems. Previous works generally assume a trusted third party to oversee the …

Fog computing micro datacenter based dynamic resource estimation and pricing model for IoT

M Aazam, EN Huh - 2015 IEEE 29th international conference …, 2015 - ieeexplore.ieee.org
Pervasive and ubiquitous computing services have recently been under focus of not only the
research community, but developers as well. Prevailing wireless sensor networks (WSNs) …

Security and privacy of smart cities: a survey, research issues and challenges

M Sookhak, H Tang, Y He, FR Yu - … Communications Surveys & …, 2018 - ieeexplore.ieee.org
With recent advances of information and communication technology, smart city has been
emerged as a new paradigm to dynamically optimize the resources in cities and provide …

Auditing cache data integrity in the edge computing environment

B Li, Q He, F Chen, H **, Y **ang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Edge computing allows app vendors to deploy their applications and relevant data on
distributed edge servers to serve nearby users. Caching data on edge servers can minimize …

Multi-access edge computing architecture, data security and privacy: A review

B Ali, MA Gregory, S Li - Ieee Access, 2021 - ieeexplore.ieee.org
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to
provide computation, storage, and networking capabilities at the edge of the network in …