A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues
M Stoyanova, Y Nikoloudakis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Today is the era of the Internet of Things (IoT). The recent advances in hardware and
information technology have accelerated the deployment of billions of interconnected, smart …
information technology have accelerated the deployment of billions of interconnected, smart …
A survey of security in cloud, edge, and fog computing
The field of information security and privacy is currently attracting a lot of research interest.
Simultaneously, different computing paradigms from Cloud computing to Edge computing …
Simultaneously, different computing paradigms from Cloud computing to Edge computing …
A review of security standards and frameworks for IoT-based smart environments
Assessing the security of IoT-based smart environments such as smart homes and smart
cities is becoming fundamentally essential to implementing the correct control measures and …
cities is becoming fundamentally essential to implementing the correct control measures and …
Security and privacy in cloud computing: technical review
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …
to the popularity and success of cloud computing. Cloud computing offers advantages and …
[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …
sources in the cloud during transit and processing. For instance, data provenance, which …
IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT
devices are especially damaging and need to be addressed. In this treatise, we overview …
devices are especially damaging and need to be addressed. In this treatise, we overview …
Threats and corrective measures for IoT security with observance of cybercrime: A survey
Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality
and comfort. IoT has contributed significantly to numerous application areas. The stormy …
and comfort. IoT has contributed significantly to numerous application areas. The stormy …
Blockchain on security and forensics management in edge computing for IoT: A comprehensive survey
Z Liao, X Pang, J Zhang, B **ong… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Security and forensics represent two key components for network management, especially
to guarantee the trusted operation of massive access networks such as the Internet of Things …
to guarantee the trusted operation of massive access networks such as the Internet of Things …
A Comprehensive Investigation of Privacy Concerns in the Context of Cloud Computing Using Self-Service Paradigms
VV Vegesna - International Journal of Management, Technology …, 2023 - papers.ssrn.com
According to a Forbes' report published in 2015, cloud-based security spending is expected
to increase by 42%. According to another research, the IT security expenditure had …
to increase by 42%. According to another research, the IT security expenditure had …
A confusion method for the protection of user topic privacy in Chinese keyword-based book retrieval
In this article, aiming at a Chinese keyword-based book search service, from a technological
perspective, we propose to modify a user query sequence carefully to confuse the user …
perspective, we propose to modify a user query sequence carefully to confuse the user …