[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …

[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges

I Indu, PMR Anand, V Bhaskar - Engineering science and technology, an …, 2018 - Elsevier
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …

Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage

W Shen, J Qin, J Yu, R Hao, J Hu - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With cloud storage services, users can remotely store their data to the cloud and realize the
data sharing with others. Remote data integrity auditing is proposed to guarantee the …

Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage

Y Yu, MH Au, G Ateniese, X Huang… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to
prove to a verifier that it is actually storing a data owner's data honestly. To date, a number of …

A blockchain-based multi-cloud storage data auditing scheme to locate faults

C Zhang, Y Xu, Y Hu, J Wu, J Ren… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Network storage services have benefited countless users worldwide due to the notable
features of convenience, economy and high availability. Since a single service provider is …

Auditing cache data integrity in the edge computing environment

B Li, Q He, F Chen, H **, Y **ang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Edge computing allows app vendors to deploy their applications and relevant data on
distributed edge servers to serve nearby users. Caching data on edge servers can minimize …

Flexible and fine-grained attribute-based data storage in cloud computing

J Li, W Yao, Y Zhang, H Qian… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
With the development of cloud computing, outsourcing data to cloud server attracts lots of
attentions. To guarantee the security and achieve flexibly fine-grained file access control …

Blockchain-based fair payment smart contract for public cloud storage auditing

H Wang, H Qin, M Zhao, X Wei, H Shen, W Susilo - Information Sciences, 2020 - Elsevier
Cloud storage plays an important role in today's cloud ecosystem. Increasingly clients tend
to outsource their data to the cloud. In spite of its copious advantages, integrity has always …

Fuzzy identity-based data integrity auditing for reliable cloud storage systems

Y Li, Y Yu, G Min, W Susilo, J Ni… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Data integrity, a core security issue in reliable cloud storage, has received much attention.
Data auditing protocols enable a verifier to efficiently check the integrity of the outsourced …

Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms

N Kaaniche, M Laurent - Computer Communications, 2017 - Elsevier
Recent technological advances have sparked the popularity and success of cloud. This new
paradigm is gaining an expanding interest, since it provides cost efficient architectures that …