Security and privacy in cloud computing: technical review

YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …

A systematic literature review of data governance and cloud data governance

M Al-Ruithe, E Benkhelifa, K Hameed - Personal and Ubiquitous …, 2019 - Springer
Data management solutions on their own are becoming very expensive and not able to cope
with the reality of everlasting data complexity. Businesses have grown more sophisticated in …

Security and privacy in fog computing: Challenges

M Mukherjee, R Matam, L Shu, L Maglaras… - IEEE …, 2017 - ieeexplore.ieee.org
Fog computing paradigm extends the storage, networking, and computing facilities of the
cloud computing toward the edge of the networks while offloading the cloud data centers …

A survey on cloud computing security: Issues, threats, and solutions

S Singh, YS Jeong, JH Park - Journal of Network and Computer …, 2016 - Elsevier
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand
services to consumers with greater flexibility in a cost effective manner. While moving …

Twenty security considerations for cloud-supported Internet of Things

J Singh, T Pasquier, J Bacon, H Ko… - IEEE Internet of things …, 2015 - ieeexplore.ieee.org
To realize the broad vision of pervasive computing, underpinned by the “Internet of
Things”(IoT), it is essential to break down application and technology-based silos and …

Cloud computing adoption framework: A security framework for business clouds

V Chang, YH Kuo, M Ramachandran - Future Generation Computer …, 2016 - Elsevier
This article presents a cloud computing adoption framework (CCAF) security suitable for
business clouds. CCAF multilayered security is based on the development and integration of …

Decentralized access control with anonymous authentication of data stored in clouds

S Ruj, M Stojmenovic, A Nayak - IEEE transactions on parallel …, 2013 - ieeexplore.ieee.org
We propose a new decentralized access control scheme for secure data storage in clouds
that supports anonymous authentication. In the proposed scheme, the cloud verifies the …

Factors that influence adoption of cloud computing: An empirical study of Australian SMEs

I Senarathna, C Wilkin, M Warren… - Australasian Journal …, 2018 - journal.acs.org.au
Cloud computing is a recent computing paradigm enabling organizations to have access to
sophisticated computing services via the Internet on a fee-for-service basis. It provides Small …

Implementation of cloud ERP in the SME: evidence from UAE

NM Alsharari, M Al-Shboul, S Alteneiji - Journal of Small Business and …, 2020 - emerald.com
Purpose This study aims to explain the implementation of Cloud enterprise resource
planning (ERP) system and underlying factors and challenges that might be practiced by the …

A Comprehensive Investigation of Privacy Concerns in the Context of Cloud Computing Using Self-Service Paradigms

VV Vegesna - International Journal of Management, Technology …, 2023 - papers.ssrn.com
According to a Forbes' report published in 2015, cloud-based security spending is expected
to increase by 42%. According to another research, the IT security expenditure had …