Securing fog computing for internet of things applications: Challenges and solutions
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …
exchange data for offering various applications, such as environmental monitoring …
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …
to grow further with the improved technological innovations. However, the associated …
[PDF][PDF] Strategic Survey on Security and Privacy Methods of Cloud Computing Environment
This analysis implements a strategic review on cloud computing environment confidentiality
and privacy approaches. In an IT sector, the recently discovering phenomenal technology is …
and privacy approaches. In an IT sector, the recently discovering phenomenal technology is …
A blockchain-based multi-cloud storage data auditing scheme to locate faults
Network storage services have benefited countless users worldwide due to the notable
features of convenience, economy and high availability. Since a single service provider is …
features of convenience, economy and high availability. Since a single service provider is …
A blockchain-enabled deduplicatable data auditing mechanism for network storage services
Since network storage services achieve widespread adoption, security and performance
issues are becoming primary concerns, affecting the scalability of storage systems …
issues are becoming primary concerns, affecting the scalability of storage systems …
Auditing cache data integrity in the edge computing environment
Edge computing allows app vendors to deploy their applications and relevant data on
distributed edge servers to serve nearby users. Caching data on edge servers can minimize …
distributed edge servers to serve nearby users. Caching data on edge servers can minimize …
An efficient and secure dynamic auditing protocol for data storage in cloud computing
In cloud computing, data owners host their data on cloud servers and users (data
consumers) can access the data from cloud servers. Due to the data outsourcing, however …
consumers) can access the data from cloud servers. Due to the data outsourcing, however …
Dynamic-hash-table based public auditing for secure cloud storage
Cloud storage is an increasingly popular application of cloud computing, which can provide
on-demand outsourcing data services for both organizations and individuals. However …
on-demand outsourcing data services for both organizations and individuals. However …
Identity-based distributed provable data possession in multicloud storage
H Wang - IEEE Transactions on Services Computing, 2014 - ieeexplore.ieee.org
Remote data integrity checking is of crucial importance in cloud storage. It can make the
clients verify whether their outsourced data is kept intact without downloading the whole …
clients verify whether their outsourced data is kept intact without downloading the whole …
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms
Recent technological advances have sparked the popularity and success of cloud. This new
paradigm is gaining an expanding interest, since it provides cost efficient architectures that …
paradigm is gaining an expanding interest, since it provides cost efficient architectures that …