Security and privacy in cloud computing: technical review

YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …

Cloud computing-enabled healthcare opportunities, issues, and applications: A systematic review

O Ali, A Shrestha, J Soar, SF Wamba - International Journal of Information …, 2018 - Elsevier
Cloud computing offers an innovative method of delivering IT services efficiently. Extant
literature suggests that cloud technology can enhance the level of services in various …

OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city

M Gheisari, HE Najafabadi, JA Alzubi, J Gao… - Future Generation …, 2021 - Elsevier
IoT devices generate data over time, which is going to be shared with other parties to
provide high-level services. Smart City is one of its applications which aims to manage cities …

Data privacy management system and method

P Lovin - US Patent 9,946,897, 2018 - Google Patents
This Summary is provided to introduce a selection of concepts in a simplified form that are
further described below in the Detailed Description. This Summary is not intended to identify …

Security and privacy in cloud computing

Z **ao, Y **ao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …

[HTML][HTML] Internet of medical things and trending converged technologies: A comprehensive review on real-time applications

SA Wagan, J Koo, IF Siddiqui, M Attique… - Journal of King Saud …, 2022 - Elsevier
Abstract The Internet of Medical Things (IoMT) facilitates patients with all-time-connected
medical devices through cost-effective solutions and a feeling of comfort with round-the …

Implementation of cloud ERP in the SME: evidence from UAE

NM Alsharari, M Al-Shboul, S Alteneiji - Journal of Small Business and …, 2020 - emerald.com
Purpose This study aims to explain the implementation of Cloud enterprise resource
planning (ERP) system and underlying factors and challenges that might be practiced by the …

A secure authenticated and key exchange scheme for fog computing

CM Chen, Y Huang, KH Wang, S Kumari… - Enterprise Information …, 2021 - Taylor & Francis
Fog computing architecture is used in various environments such as smart manufacturing,
vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security …

A privacy-aware authentication scheme for distributed mobile cloud computing services

JL Tsai, NW Lo - IEEE systems journal, 2015 - ieeexplore.ieee.org
In modern societies, the number of mobile users has dramatically risen in recent years. In
this paper, an efficient authentication scheme for distributed mobile cloud computing …

[PDF][PDF] Public vs private vs hybrid vs community-cloud computing: a critical review

S Goyal - International Journal of Computer Network and …, 2014 - mecs-press.org
These days cloud computing is booming like no other technology. Every organization
whether it's small, mid-sized or big, wants to adapt this cutting edge technology for its …