Security and privacy in cloud computing: technical review
YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …
to the popularity and success of cloud computing. Cloud computing offers advantages and …
A systematic literature review of data governance and cloud data governance
M Al-Ruithe, E Benkhelifa, K Hameed - Personal and Ubiquitous …, 2019 - Springer
Data management solutions on their own are becoming very expensive and not able to cope
with the reality of everlasting data complexity. Businesses have grown more sophisticated in …
with the reality of everlasting data complexity. Businesses have grown more sophisticated in …
Security and privacy in fog computing: Challenges
Fog computing paradigm extends the storage, networking, and computing facilities of the
cloud computing toward the edge of the networks while offloading the cloud data centers …
cloud computing toward the edge of the networks while offloading the cloud data centers …
A survey on cloud computing security: Issues, threats, and solutions
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand
services to consumers with greater flexibility in a cost effective manner. While moving …
services to consumers with greater flexibility in a cost effective manner. While moving …
Twenty security considerations for cloud-supported Internet of Things
J Singh, T Pasquier, J Bacon, H Ko… - IEEE Internet of things …, 2015 - ieeexplore.ieee.org
To realize the broad vision of pervasive computing, underpinned by the “Internet of
Things”(IoT), it is essential to break down application and technology-based silos and …
Things”(IoT), it is essential to break down application and technology-based silos and …
Cloud computing adoption framework: A security framework for business clouds
V Chang, YH Kuo, M Ramachandran - Future Generation Computer …, 2016 - Elsevier
This article presents a cloud computing adoption framework (CCAF) security suitable for
business clouds. CCAF multilayered security is based on the development and integration of …
business clouds. CCAF multilayered security is based on the development and integration of …
Decentralized access control with anonymous authentication of data stored in clouds
We propose a new decentralized access control scheme for secure data storage in clouds
that supports anonymous authentication. In the proposed scheme, the cloud verifies the …
that supports anonymous authentication. In the proposed scheme, the cloud verifies the …
Factors that influence adoption of cloud computing: An empirical study of Australian SMEs
Cloud computing is a recent computing paradigm enabling organizations to have access to
sophisticated computing services via the Internet on a fee-for-service basis. It provides Small …
sophisticated computing services via the Internet on a fee-for-service basis. It provides Small …
Implementation of cloud ERP in the SME: evidence from UAE
NM Alsharari, M Al-Shboul, S Alteneiji - Journal of Small Business and …, 2020 - emerald.com
Purpose This study aims to explain the implementation of Cloud enterprise resource
planning (ERP) system and underlying factors and challenges that might be practiced by the …
planning (ERP) system and underlying factors and challenges that might be practiced by the …
A Comprehensive Investigation of Privacy Concerns in the Context of Cloud Computing Using Self-Service Paradigms
VV Vegesna - International Journal of Management, Technology …, 2023 - papers.ssrn.com
According to a Forbes' report published in 2015, cloud-based security spending is expected
to increase by 42%. According to another research, the IT security expenditure had …
to increase by 42%. According to another research, the IT security expenditure had …