[HTML][HTML] Cyber security in iot-based cloud computing: A comprehensive survey
Cloud computing provides the flexible architecture where data and resources are dispersed
at various locations and are accessible from various industrial environments. Cloud …
at various locations and are accessible from various industrial environments. Cloud …
A survey on Classification of Cyber-attacks on IoT and IIoT devices
Y Shah, S Sengupta - 2020 11th IEEE Annual Ubiquitous …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) devices have gained popularity in recent years. With the increased
usage of IoT devices, users have become more prone to Cyber-attacks. Threats against IoT …
usage of IoT devices, users have become more prone to Cyber-attacks. Threats against IoT …
Fog computing: a comprehensive architectural survey
Fog computing is an emerging technology to address computing and networking bottlenecks
in large scale deployment of IoT applications. It is a promising complementary computing …
in large scale deployment of IoT applications. It is a promising complementary computing …
Classification of cyber security threats on mobile devices and applications
Mobile devices and applications are prone to different kinds of cyber threats and attacks that
affect their users' privacy. Therefore, there is critical need to understand all cyber threats …
affect their users' privacy. Therefore, there is critical need to understand all cyber threats …
Security issues in IIoT: A comprehensive survey of attacks on IIoT and its countermeasures
AC Panchal, VM Khadse… - 2018 IEEE Global …, 2018 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) applications connect machines, sensors and actuators in
high-stake manufacturing industries. Industrial systems are using the potential of IoT to …
high-stake manufacturing industries. Industrial systems are using the potential of IoT to …
Security and privacy issues in cloud, fog and edge computing
The advent of technologies like IoT and 5G brought a new computing paradigm called cloud
computing into the world. Cloud computing has become the main platform for data …
computing into the world. Cloud computing has become the main platform for data …
Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review
The emergence of Internet of Things (IoT) has introduced smart objects as the fundamental
building blocks for developing a smart cyber-physical universal environment. The IoTs have …
building blocks for developing a smart cyber-physical universal environment. The IoTs have …
Cloud computing security challenges, threats and vulnerabilities
MK Sasubilli, R Venkateswarlu - 2021 6th international …, 2021 - ieeexplore.ieee.org
Cloud computing has grown to become an integral part of present as well as future
information technologies. This technology has been designed to be used with internet by …
information technologies. This technology has been designed to be used with internet by …
Taxonomy for identification of security issues in cloud computing environments
M Ahmed, AT Litchfield - Journal of Computer Information Systems, 2018 - Taylor & Francis
ABSTRACT The emergence of Cloud Computing and consequential changes to
infrastructure and work practices leaves little doubt that most computing platforms will be …
infrastructure and work practices leaves little doubt that most computing platforms will be …
A survey on the security of cloud computing
L Alhenaki, A Alwatban, B Alamri… - 2019 2nd international …, 2019 - ieeexplore.ieee.org
Within the recent decade, major innovations in technology have emerged, that potentially
add more convenience to daily life practices not only on an enterprise level but on an …
add more convenience to daily life practices not only on an enterprise level but on an …