Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges

I Indu, PMR Anand, V Bhaskar - Engineering science and technology, an …, 2018 - Elsevier
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …

Privacy protection and data security in cloud computing: a survey, challenges, and solutions

PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …

Attribute-based access control for ICN naming scheme

B Li, D Huang, Z Wang, Y Zhu - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Information Centric Networking (ICN) is a new network architecture that aims to overcome
the weakness of existing IPbased networking architecture. Instead of establishing a …

TAFC: Time and attribute factors combined access control for time-sensitive data in public cloud

J Hong, K Xue, Y Xue, W Chen, DSL Wei… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
The new paradigm of outsourcing data to the cloud is a double-edged sword. On the one
hand, it frees data owners from the technical management, and is easier for data owners to …

[PDF][PDF] Methodologies, requirements, and challenges of cybersecurity frameworks: A review

AD Khaleefah, HM Al-Mashhadi - Iraqi Journal of Science, 2024 - iasj.net
As a result of the emergence of new business paradigms and the development of the digital
economy, the interaction between operations, services, things, and software across …

Attribute-based approaches for secure data sharing in industrial contexts

A Chiquito, U Bodin, O Schelén - IEEE Access, 2023 - ieeexplore.ieee.org
The sharing of data is becoming increasingly important for the process and manufacturing
industries that are using data-driven models and advanced analysis to assess production …

A comprehensive survey on Software as a Service (SaaS) transformation for the automotive systems

DF Blanco, F Le Mouël, T Lin, MP Escudié - IEEE Access, 2023 - ieeexplore.ieee.org
Over the last few decades, automotive embedded Information and Communication
Technology (ICT) systems have been used to enhance vehicle performance and enrich …

Multimedia recommendation and transmission system based on cloud platform

J Yang, H Wang, Z Lv, W Wei, H Song… - Future Generation …, 2017 - Elsevier
This paper presents a movie recommendation system according to scores that the users
provide. In view of the movie evaluation system, the impacts of access control and …

Efficient and secure attribute-based access control with identical sub-policies frequently used in cloud storage

K Xue, N Gai, J Hong, DSL Wei… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Under the assumption of honest-but-curious cloud service provider, various cryptographic
techniques have been used to address the issues of data access control and confidentiality …