Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach

X Li, Q Wang, X Lan, X Chen, N Zhang, D Chen - IEEE access, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) provides a new paradigm for the development of heterogeneous
and distributed systems, and it has increasingly become a ubiquitous computing service …

MTD-DHJS: makespan-optimized task scheduling algorithm for cloud computing with dynamic computational time prediction

P Banerjee, S Roy, A Sinha, MM Hassan, S Burje… - IEEE …, 2023 - ieeexplore.ieee.org
Cloud computing has revolutionized the management and analysis of data for organizations,
offering scalability, flexibility, and cost-effectiveness. Effective task scheduling in cloud …

[PDF][PDF] Multi-factor authentication for secured financial transactions in cloud environment

D Prabakaran, S Ramachandran - CMC-Computers, Materials & …, 2022 - cdn.techscience.cn
The rise of the digital economy and the comfort of accessing by way of user mobile devices
expedite human endeavors in financial transactions over the Virtual Private Network (VPN) …

A comprehensive study of cloud forensics

P Purnaye, V Kulkarni - Archives of Computational Methods in …, 2022 - Springer
Cloud Computing has many facets to it which makes it diverse. Investigation of a cyber-crime
that involves the cloud as a subject, object, or as an environment, is cloud forensics …

Secure cloud-edge deployments, with trust

S Forti, GL Ferrari, A Brogi - Future Generation Computer Systems, 2020 - Elsevier
Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-
Edge infrastructures operated by different providers is a non-trivial task. In this article, we …

Using identity‐based cryptography as a foundation for an effective and secure cloud model for e‐health

S Mittal, A Bansal, D Gupta, S Juneja… - Computational …, 2022 - Wiley Online Library
Nowadays, one of the most popular applications is cloud computing for storing data and
information through World Wide Web. Since cloud computing has become available, users …

A risk assessment model for selecting cloud service providers

E Cayirci, A Garaga, A Santana de Oliveira… - Journal of Cloud …, 2016 - Springer
Abstract The Cloud Adoption Risk Assessment Model is designed to help cloud customers in
assessing the risks that they face by selecting a specific cloud service provider. It evaluates …

Self-organized network management and computing of intelligent solutions to information security

X Zhu - Journal of Organizational and End User Computing …, 2021 - igi-global.com
The network in information age has become an important part of life, but in the process of in-
depth application of computers and networks, information security issues have also become …

[HTML][HTML] Strategies for efficient resource management in federated cloud environments supporting Infrastructure as a Service (IaaS)

AK Samha - Journal of Engineering Research, 2024 - Elsevier
The increased market activity and visibility have resulted in a growing demand for additional
computer resources to meet the needs of cloud clients. Delivering promised quality of …

Context-aware multifaceted trust framework for evaluating trustworthiness of cloud providers

M Alhanahnah, P Bertok, Z Tari, S Alouneh - Future Generation Computer …, 2018 - Elsevier
With the rapidly increasing number of cloud-based services, selecting a service provider is
becoming more and more difficult. Among the many factors to be considered, trust in a given …