Cloud Security Using Fine-Grained Efficient Information Flow Tracking

F Alqahtani, M Almutairi, FT Sheldon - Future Internet, 2024 - mdpi.com
This study provides a comprehensive review and comparative analysis of existing
Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data …

Effective task scheduling in critical fog applications

A Khan, A Abbas, HA Khattak, F Rehman… - Scientific …, 2022 - Wiley Online Library
Information and technology have witnessed significant improvement with the introduction of
Internet of things (IoT) applications, and most of the IoT applications are dependent on the …

Performance based Risk driven Trust (PRTrust): On modeling of secured service sharing in peer-to-peer federated cloud

R Kumar, R Goyal - Computer Communications, 2022 - Elsevier
Abstract Peer-to-peer (P2P) federated cloud system has emerged as a promising service
delivery model wherein multiple cloud service providers (CSPs) collaborate and share …

A quantitative framework for security assurance evaluation and selection of cloud services: a case study

A Shukla, B Katt, MM Yamin - International Journal of Information Security, 2023 - Springer
Due to the high adoption of cloud services, the protection of data and information is critical.
Cloud service customers (CSCs) need help to obtain the authoritative assurances required …

Effective Task Scheduling in Critical Fog Applications Using Critical Task Indexing Scheduler (CTIS)

A Ali, I Taj, A Khattak, B Hayat, N Gul… - 2023 14th International …, 2023 - ieeexplore.ieee.org
To decrease time delay, energy consumption, and network utilization in the Internet of
Things (IoT) is a key research area. The rapid advancement in IoT, leading to increase in …

[HTML][HTML] icontainer: Consecutive checkpointing with rapid resilience for immortal container-based services

SH Choi, KW Park - Journal of Network and Computer Applications, 2022 - Elsevier
Container-based cloud services that can achieve scalability at a low cost by dividing a
complex system into instances, functions, or applications are essential for the operation of …

Dynamic security in cloud computing based on fuzzy cognitive maps

M Asma - Journal of Intelligent & Fuzzy Systems, 2024 - content.iospress.com
Cloud Computing is a new paradigm that provides software and hardware resources based
on customers' needs. However, data security remains a significant concern, acting as a …

Insufficient Due Diligence: Knowledge-Related Threats in Cloud Computing

F Loots, H Gjermundrød, I Dionysiou - The International Conference on …, 2024 - Springer
It is well known that the human factor still plays a significant role in security incidents as
malicious actors exploit vulnerabilities in the human dimension of the attack surface to …

Dynamic and Integrated Security Model in Inter Cloud for Image Classification

AM Shah, I Abid - … University Journal of Engineering and Applied …, 2024 - fujeas.fui.edu.pk
Cloud computing has transformed software and database accessibility, utilizing the Internet
and server hosting. However, security risks arise, including malware attacks and website …

[IDÉZET][C] Πόσο ασφαλές είναι το Υπολογιστικό Νέφος

Δ Γιαγτζή, Π Λιαρομάτης - 2023