[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

OI Abiodun, M Alawida, AE Omolara… - Journal of King Saud …, 2022 - Elsevier
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …

Security and privacy in cloud computing

Z **ao, Y **ao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …

Anonymous and traceable group data sharing in cloud computing

J Shen, T Zhou, X Chen, J Li… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Group data sharing in cloud environments has become a hot topic in recent decades. With
the popularity of cloud computing, how to achieve secure and efficient data sharing in cloud …

A review on the state-of-the-art privacy-preserving approaches in the e-health clouds

A Abbas, SU Khan - IEEE journal of Biomedical and health …, 2014 - ieeexplore.ieee.org
Cloud computing is emerging as a new computing paradigm in the healthcare sector
besides other business domains. Large numbers of health organizations have started …

Mona: Secure multi-owner data sharing for dynamic groups in the cloud

X Liu, Y Zhang, B Wang, J Yan - IEEE transactions on parallel …, 2012 - ieeexplore.ieee.org
With the character of low maintenance, cloud computing provides an economical and
efficient solution for sharing group resource among cloud users. Unfortunately, sharing data …

TrustCloud: A framework for accountability and trust in cloud computing

RKL Ko, P Jagadpramana, M Mowbray… - 2011 IEEE World …, 2011 - ieeexplore.ieee.org
The key barrier to widespread uptake of cloud computing is the lack of trust in clouds by
potential customers. While preventive controls for security and privacy are actively …

Decentralized access control with anonymous authentication of data stored in clouds

S Ruj, M Stojmenovic, A Nayak - IEEE transactions on parallel …, 2013 - ieeexplore.ieee.org
We propose a new decentralized access control scheme for secure data storage in clouds
that supports anonymous authentication. In the proposed scheme, the cloud verifies the …

Methods for internet communication security

M Clark, A Gordon, M Clark - US Patent 10,361,859, 2019 - Google Patents
H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure
communications; Network security protocols including means for verifying the identity or …

Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage

B Cui, Z Liu, L Wang - IEEE Transactions on computers, 2015 - ieeexplore.ieee.org
The capability of selectively sharing encrypted data with different users via public cloud
storage may greatly ease security concerns over inadvertent data leaks in the cloud. A key …

Technical issues of forensic investigations in cloud computing environments

D Birk, C Wegener - 2011 Sixth IEEE international workshop on …, 2011 - ieeexplore.ieee.org
Cloud Computing is arguably one of the most discussed information technologies today. It
presents many promising technological and economical opportunities. However, many …