Cloud computing security challenges & solutions-A survey

S Basu, A Bardhan, K Gupta, P Saha… - 2018 IEEE 8th …, 2018 - ieeexplore.ieee.org
Cloud Computing and its' related security issues as well as countermeasures are one of the
highly debated topics in today's research field. Though, various surveys regarding Cloud …

Practical secure computation outsourcing: A survey

Z Shan, K Ren, M Blanton, C Wang - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …

A survey on cloud computing security: Issues, threats, and solutions

S Singh, YS Jeong, JH Park - Journal of Network and Computer …, 2016 - Elsevier
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand
services to consumers with greater flexibility in a cost effective manner. While moving …

Ask the experts: What should be on an IoT privacy and security label?

P Emami-Naeini, Y Agarwal, LF Cranor… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Information about the privacy and security of Internet of Things (IoT) devices is not readily
available to consumers who want to consider it before making purchase decisions. While …

Current cyber-defense trends in industrial control systems

JE Rubio, C Alcaraz, R Roman, J Lopez - Computers & Security, 2019 - Elsevier
Abstract Advanced Persistent Threats (APTs) have become a serious hazard for any critical
infrastructure, as a single solution to protect all industrial assets from these complex attacks …

IoT-enabled water distribution systems—A comparative technological review

NK Velayudhan, P Pradeep, SN Rao… - IEEE …, 2022 - ieeexplore.ieee.org
Water distribution systems are one of the critical infrastructures and major assets of the water
utility in a nation. The infrastructure of the distribution systems consists of resources …

Towards quantification and evaluation of security of Cloud Service Providers

T Halabi, M Bellaiche - Journal of Information Security and Applications, 2017 - Elsevier
Security is still the main obstacle preventing companies and businesses which deal with
private information and confidential data from migrating towards the Cloud. Cloud Service …

Fast, scalable and secure onloading of edge functions using airbox

K Bhardwaj, MW Shih, P Agarwal… - 2016 IEEE/ACM …, 2016 - ieeexplore.ieee.org
This paper argues for the utility of back-end driven onloading to the edge as a way to
address bandwidth use and latency challenges for future device-cloud interactions …

A framework for critical security factors that influence the decision of cloud adoption by Saudi government agencies

MO Alassafi, A Alharthi, RJ Walters, GB Wills - Telematics and Informatics, 2017 - Elsevier
Cloud computing technologies can play an essential role in public organisations and
companies while it reduces the cost of using information technology services. It allows users …

[HTML][HTML] Navigating the digital twin network landscape: A survey on architecture, applications, privacy and security

AMVV Sai, C Wang, Z Cai, Y Li - High-Confidence Computing, 2024 - Elsevier
In recent years, immense developments have occurred in the field of Artificial Intelligence
(AI) and the spread of broadband and ubiquitous connectivity technologies. This has led to …