Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Cybersecurity Architecture for the Cloud: Protecting Network in a Virtual Environment

AA Mughal - International Journal of Intelligent Automation …, 2021 - research.tensorgate.org
The use of cloud computing has increased the threat of cyber attacks and data breaches,
making a strong cloud cybersecurity architecture crucial for organizations. The architecture …

Enterprise data security measures: a comparative review of effectiveness and risks across different industries and organization types

V Bandari - … Journal of Business Intelligence and Big Data …, 2023 - research.tensorgate.org
This research aims to investigate the types of data security measures commonly used by
enterprises to safeguard sensitive data and their effectiveness in preventing security …

Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions

I Gupta, AK Singh, CN Lee, R Buyya - IEEE Access, 2022 - ieeexplore.ieee.org
A large number of researchers, academia, government sectors, and business enterprises
are adopting the cloud environment due to the least upfront capital investment, maximum …

Towards achieving data security with the cloud computing adoption framework

V Chang, M Ramachandran - IEEE Transactions on services …, 2015 - ieeexplore.ieee.org
Offering real-time data security for petabytes of data is important for cloud computing. A
recent survey on cloud security states that the security of users' data has the highest priority …

Current research and open problems in attribute-based access control

D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …

An efficient file hierarchy attribute-based encryption scheme in cloud computing

S Wang, J Zhou, JK Liu, J Yu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption
technology to solve the challenging problem of secure data sharing in cloud computing. The …

HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing

Z Wan, RH Deng - IEEE transactions on information forensics …, 2011 - ieeexplore.ieee.org
Cloud computing has emerged as one of the most influential paradigms in the IT industry in
recent years. Since this new computing technology requires users to entrust their valuable …

Decentralized access control with anonymous authentication of data stored in clouds

S Ruj, M Stojmenovic, A Nayak - IEEE transactions on parallel …, 2013 - ieeexplore.ieee.org
We propose a new decentralized access control scheme for secure data storage in clouds
that supports anonymous authentication. In the proposed scheme, the cloud verifies the …