[PDF][PDF] Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions

E Politou, E Alepis, C Patsakis - Journal of cybersecurity, 2018 - academic.oup.com
Abstract Upon the General Data Protection Regulation's (GDPR) application on 25 May
2018 across the European Union, new legal requirements for the protection of personal data …

A survey on IoT-enabled home automation systems: Attacks and defenses

Z Wang, D Liu, Y Sun, X Pang, P Sun… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
With recent advances in communication technologies and Internet of Things (IoT)
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …

Link between sustainability and industry 4.0: trends, challenges and new perspectives

LB Furstenau, MK Sott, LM Kipper, EL Machado… - Ieee …, 2020 - ieeexplore.ieee.org
The increasing number of studies that underline the relationship between industry 4.0 and
sustainability shows that sustainability is one of the pillars of smart factories. Through a …

Twenty security considerations for cloud-supported Internet of Things

J Singh, T Pasquier, J Bacon, H Ko… - IEEE Internet of things …, 2015 - ieeexplore.ieee.org
To realize the broad vision of pervasive computing, underpinned by the “Internet of
Things”(IoT), it is essential to break down application and technology-based silos and …

Privacy preserving deep computation model on cloud for big data feature learning

Q Zhang, LT Yang, Z Chen - IEEE Transactions on Computers, 2015 - ieeexplore.ieee.org
To improve the efficiency of big data feature learning, the paper proposes a privacy
preserving deep computation model by offloading the expensive operations to the cloud …

Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

From security to assurance in the cloud: A survey

CA Ardagna, R Asal, E Damiani, QH Vu - ACM Computing Surveys …, 2015 - dl.acm.org
The cloud computing paradigm has become a mainstream solution for the deployment of
business processes and applications. In the public cloud vision, infrastructure, platform, and …

Kubernetes in IT administration and serverless computing: An empirical study and research challenges

SK Mondal, R Pan, HMD Kabir, T Tian… - The Journal of …, 2022 - Springer
Today's industry has gradually realized the importance of lifting efficiency and saving costs
during the life-cycle of an application. In particular, we see that most of the cloud-based …

Internet of cloud: Security and privacy issues

A Cook, M Robinson, MA Ferrag, LA Maglaras… - Cloud Computing for …, 2018 - Springer
The synergy between Cloud and IoT has emerged largely due to the Cloud having attributes
which directly benefit IoT and enable its continued growth. IoT adopting Cloud services has …

Cloud computing service models: A comparative study

MU Bokhari, QM Shallal… - 2016 3rd international …, 2016 - ieeexplore.ieee.org
Cloud computing still suffer of many security issues that required the researchers to focus on
it to make the users fully trust on it. In this paper we explain the security issues which …