DARGOS: A highly adaptable and scalable monitoring architecture for multi-tenant Clouds

J Povedano-Molina, JM Lopez-Vega… - Future Generation …, 2013 - Elsevier
One of the most important features in Cloud environments is to know the status and the
availability of the physical resources and services present in the current infrastructure. A full …

Leveraging cloud computing for the semantic web: review and trends

O Adedugbe, E Benkhelifa, R Campion, F Al-Obeidat… - Soft Computing, 2020 - Springer
Semantic and cloud computing technologies have become vital elements for developing
and deploying solutions across diverse fields in computing. While they are independent of …

Semantic web technologies in cloud computing: a systematic literature review

H Brabra, A Mtibaa, L Sliman… - 2016 IEEE …, 2016 - ieeexplore.ieee.org
During the last years we have seen a dramatic increase of new Cloud providers,
applications, services, management platforms, data, etc. reaching a level of complexity that …

Enhancing multi‐tenancy security in the cloud computing using hybrid ECC‐based data encryption approach

P Kumar, A Kumar Bhatt - IET Communications, 2020 - Wiley Online Library
In this study, elliptic curve cryptography (ECC) is elected for tenant authentication, data
encryption, and data decryption due to its minimum key size. The proposed ECC‐based …

Semantic-aware security orchestration in SDN/NFV-enabled IoT systems

A Molina Zarca, M Bagaa, J Bernal Bernabe, T Taleb… - Sensors, 2020 - mdpi.com
IoT systems can be leveraged by Network Function Virtualization (NFV) and Software-
Defined Networking (SDN) technologies, thereby strengthening their overall flexibility …

Multi-tenant attribute-based access control for cloud infrastructure services

C Ngo, Y Demchenko, C de Laat - Journal of information security and …, 2016 - Elsevier
Cloud Computing is developed as a new wave of ICT technologies, offering a common
approach to on-demand provisioning of computation, storage and network resources that …

Cloud identity management: A survey on privacy strategies

J Werner, CM Westphall, CB Westphall - Computer Networks, 2017 - Elsevier
With the rise of cloud computing, thousands of users and multiple applications have sought
to communicate with each other, exchanging sensitive data. Thus, for effectively managing …

DYVERSE: dynamic vertical scaling in multi-tenant edge environments

N Wang, M Matthaiou, DS Nikolopoulos… - Future Generation …, 2020 - Elsevier
Multi-tenancy in resource-constrained environments is a key challenge in Edge computing.
In this paper, we develop 'DYVERSE: DYnamic VERtical Scaling in Edge'environments …

[PDF][PDF] Applications of access control as a service for software security

P Dašić, J Dašić, B Crvenković - International Journal of Industrial …, 2016 - researchgate.net
Cloud technology has been around for some time now and is gaining increased influence in
almost every aspect of information technology services. As a consequence of above stated …

A reference architecture for provisioning of tools as a service: meta-model, ontologies and design elements

MA Chauhan, MA Babar, QZ Sheng - Future Generation Computer Systems, 2017 - Elsevier
Software Architecture (SA) plays a critical role in designing, developing and evolving cloud-
based platforms that can be used to provision different types of services for consumers on …