Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019‏ - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …

Towards workflow scheduling in cloud computing: a comprehensive analysis

M Masdari, S ValiKardan, Z Shahi, SI Azar - Journal of Network and …, 2016‏ - Elsevier
Workflow scheduling is one of the prominent issues in cloud computing which is aimed at
complete execution of workflows by considering their QoS requirements such as deadline …

A literature review on cloud computing adoption issues in enterprises

RF El-Gazzar - Creating Value for All Through IT: IFIP WG 8.6 …, 2014‏ - Springer
Cloud computing has received increasing interest from enterprises since its inception. With
its innovative information technology (IT) services delivery model, cloud computing could …

Security and privacy-enhancing multicloud architectures

JM Bohli, N Gruschka, M Jensen… - … on dependable and …, 2013‏ - ieeexplore.ieee.org
Security challenges are still among the biggest obstacles when considering the adoption of
cloud services. This triggered a lot of research activities, resulting in a quantity of proposals …

[کتاب][B] The cloud security ecosystem: technical, legal, business and management issues

R Choo, R Ko - 2015‏ - books.google.com
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security
Ecosystem comprehensively discusses a range of cloud security topics from multi …

Partitioning and cloud deployment of composite web services under security constraints

E Goettelmann, W Fdhila… - 2013 IEEE International …, 2013‏ - ieeexplore.ieee.org
In this paper, we propose an approach for deploying business processes on the cloud
supporting security constraints, thereby ensuring sensitive data exchange. This approach …

Data sources and datasets for cloud intrusion detection modeling and evaluation

A Aldribi, I Traore, B Moa - Cloud computing for optimization: foundations …, 2018‏ - Springer
Over the past few years cloud computing has skyrocketed in popularity within the IT industry.
Shifting towards cloud computing is attracting not only industry but also government and …

Business process outsourcing to the cloud: Balancing costs with security risks

AA Nacer, C Godart, G Rosinosky, A Tari, S Youcef - Computers in industry, 2019‏ - Elsevier
The cloud computing introduced security risks which make companies reluctant to adopt it.
Some means exist for reducing these risks while deploying a business process (BP) in the …

Integrating the internet of things (IoT) and cloud computing challenges and solutions: A review

A Fatlawi, MJ Al-Dujaili - AIP Conference Proceedings, 2023‏ - pubs.aip.org
Cloud IoT and" IoT" are two very different technologies that have involved both parts of our
lives. It is foreseen that in the close future, their use will become more prevalent and become …

A security risk assessment model for business process deployment in the cloud

E Goettelmann, K Dahman, B Gateau… - 2014 IEEE …, 2014‏ - ieeexplore.ieee.org
Managing security risks on information systems is essential to guarantee their security while
handling costs. However, the complexity of risk assessments is greatly increased when data …