Securing fog computing for internet of things applications: Challenges and solutions
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …
exchange data for offering various applications, such as environmental monitoring …
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …
to grow further with the improved technological innovations. However, the associated …
Cybersecurity Architecture for the Cloud: Protecting Network in a Virtual Environment
AA Mughal - International Journal of Intelligent Automation …, 2021 - research.tensorgate.org
The use of cloud computing has increased the threat of cyber attacks and data breaches,
making a strong cloud cybersecurity architecture crucial for organizations. The architecture …
making a strong cloud cybersecurity architecture crucial for organizations. The architecture …
Enterprise data security measures: a comparative review of effectiveness and risks across different industries and organization types
V Bandari - … Journal of Business Intelligence and Big Data …, 2023 - research.tensorgate.org
This research aims to investigate the types of data security measures commonly used by
enterprises to safeguard sensitive data and their effectiveness in preventing security …
enterprises to safeguard sensitive data and their effectiveness in preventing security …
Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions
A large number of researchers, academia, government sectors, and business enterprises
are adopting the cloud environment due to the least upfront capital investment, maximum …
are adopting the cloud environment due to the least upfront capital investment, maximum …
Towards achieving data security with the cloud computing adoption framework
V Chang, M Ramachandran - IEEE Transactions on services …, 2015 - ieeexplore.ieee.org
Offering real-time data security for petabytes of data is important for cloud computing. A
recent survey on cloud security states that the security of users' data has the highest priority …
recent survey on cloud security states that the security of users' data has the highest priority …
Current research and open problems in attribute-based access control
D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
An efficient file hierarchy attribute-based encryption scheme in cloud computing
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption
technology to solve the challenging problem of secure data sharing in cloud computing. The …
technology to solve the challenging problem of secure data sharing in cloud computing. The …
HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
Cloud computing has emerged as one of the most influential paradigms in the IT industry in
recent years. Since this new computing technology requires users to entrust their valuable …
recent years. Since this new computing technology requires users to entrust their valuable …
Decentralized access control with anonymous authentication of data stored in clouds
We propose a new decentralized access control scheme for secure data storage in clouds
that supports anonymous authentication. In the proposed scheme, the cloud verifies the …
that supports anonymous authentication. In the proposed scheme, the cloud verifies the …