Impacts of blockchain in software‐defined Internet of Things ecosystem with Network Function Virtualization for smart applications: Present perspectives and future …

A Rahman, J Islam, D Kundu, R Karim… - International Journal …, 2025 - Wiley Online Library
As an emerging technology, blockchain (BC) has been playing a promising role in today's
software‐defined networking (SDN)‐enabled Internet of Things (IoT) applications. Because …

[HTML][HTML] Software compliance requirements, factors, and policies: A systematic literature review

M Mubarkoot, J Altmann, M Rasti-Barzoki, B Egger… - Computers & …, 2023 - Elsevier
Background Recent statistics reveal that 56% of software attacks are caused by insider
negligence and 26% are caused by malicious insiders. They also show that 67% of …

[HTML][HTML] Cyberattacks and security of cloud computing: a complete guideline

M Dawood, S Tu, C **ao, H Alasmary, M Waqas… - Symmetry, 2023 - mdpi.com
Cloud computing is an innovative technique that offers shared resources for stock cache and
server management. Cloud computing saves time and monitoring costs for any organization …

Effective data storage and dynamic data auditing scheme for providing distributed services in federated cloud

AM Sermakani, D Paulraj - Journal of circuits, Systems and …, 2020 - World Scientific
Recently, many organizations and industries are using the cloud computing technologies for
exchanging the resources and their confidential data. For this purpose, many cloud services …

ProSAS: Proactive Security Auditing System for Clouds

S Majumdar, GS Chawla… - … on Dependable and …, 2021 - ieeexplore.ieee.org
The multi-tenancy in a cloud along with its dynamic and self-service nature could cause
severe security concerns, such as isolation breaches among cloud tenants. To mitigate such …

A data security and integrity framework using third-party cloud auditing

B Mishachandar, S Vairamuthu, M Pavithra - International Journal of …, 2021 - Springer
In the current cloud computing development era, security and integrity restrictions on the
users and service providers are at a constant increase. Users using cloud storage enjoy …

Exploring User Perceptions of Security Auditing in the Web3 Ecosystem

MZ Huang, R Jiang, T Sharma, KY Wang - Cryptology ePrint Archive, 2024 - eprint.iacr.org
In the rapidly evolving Web3 ecosystem, transparent auditing has emerged as a critical
component for both applications and users. However, there is a significant gap in …

JRS: A joint regulating scheme for secretly shared content based on blockchain

Q Lyu, H Li, Z Deng, X Zhang, Y Qi… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
For the sake of privacy, encrypting the content shared on the Internet is becoming popular.
However, it brings a nontrivial challenge in regulating the illicit shared content (eg, viruses …

On reducing underutilization of security standards by deriving actionable rules: An application to iot

MWP Shuvo, MN Hoq, S Majumdar… - … Conference on Research …, 2023 - Springer
Even though there exist a number of security guidelines and recommendations from various
worldwide standardization authorities (eg, NIST, ISO, ENISA), it is evident from many of the …

Cross-Level Security Verification for Network Functions Virtualization (NFV)

A Oqaily, ME Kabir, L Wang, Y Jarraya… - … on Dependable and …, 2025 - ieeexplore.ieee.org
Network Functions Virtualization (NFV) is a popular solution for providing multi-tenant
network services on top of existing cloud infrastructures in an agile and cost-effective …