Cyber security in iot-based cloud computing: A comprehensive survey
Cloud computing provides the flexible architecture where data and resources are dispersed
at various locations and are accessible from various industrial environments. Cloud …
at various locations and are accessible from various industrial environments. Cloud …
Security algorithms for cloud computing
A Bhardwaj, GVB Subrahmanyam, V Avasthi… - Procedia Computer …, 2016 - Elsevier
With growing awareness and concerns regards to Cloud Computing and Information
Security, there is growing awareness and usage of Security Algorithms into data systems …
Security, there is growing awareness and usage of Security Algorithms into data systems …
A privacy preserving distributed ledger framework for global human resource record management: The blockchain aspect
Blockchain is a technology used with the series of users in peer-to-peer transactions to
utilize the usability properties of the immutable data records. The distributed nature of this …
utilize the usability properties of the immutable data records. The distributed nature of this …
A novel and secure smart parking management system (SPMS) based on integration of WSN, RFID, and IoT
O Abdulkader, AM Bamhdi… - 2018 15th Learning …, 2018 - ieeexplore.ieee.org
Nowadays, finding a secure parking lot in modern cities deemed as very hard and time-
consuming task. Leaving negative implications on traffic congestion, air pollutions, climate …
consuming task. Leaving negative implications on traffic congestion, air pollutions, climate …
[PDF][PDF] Internet of things (IoT): a technology review, security issues, threats, and open challenges
AA Abbood, QM Shallal… - Indonesian Journal of …, 2020 - pdfs.semanticscholar.org
Internet of things (IoT) devices are spread in different areas such as e-tracking, e-commerce,
e-home, and e-health, etc. Thus, during the last ten years, the internet of things technology …
e-home, and e-health, etc. Thus, during the last ten years, the internet of things technology …
Intelligent Monitoring System with Privacy Preservation Based on Edge AI
Currently, the trend of elderly people living alone is rising due to rapid aging and shifts in
family structures. Accordingly, the efficient implementation and management of monitoring …
family structures. Accordingly, the efficient implementation and management of monitoring …
Software as a service challenges: A systematic literature review
AMA Ibrahim, NS Abdullah, M Bahari - Proceedings of the Future …, 2023 - Springer
Abstract Software as a Service (SaaS) as a type of Cloud computing is a type of computing
that become a contentious topic among enterprise information technology (IT) professionals …
that become a contentious topic among enterprise information technology (IT) professionals …
Smart Contracts for supply chain applicable to Smart Cities daily operations
JM Montes, CE Ramirez, MC Gutierrez… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
In Smart Cities, an era of technology and on-demand offerings, being able to have a signed
contract in the least amount of time possible can significantly benefit business operations …
contract in the least amount of time possible can significantly benefit business operations …
Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms
Due to the high growth of Internet of Things and cloud computing services it has brought
great changes within the human lifestyle in various fields such as (medical, agricultural …
great changes within the human lifestyle in various fields such as (medical, agricultural …
[PDF][PDF] Method to implement K-NN machine learningto classify data privacy in IoT environment
Internet of Things technology allows many devices to connect with each other. The
interaction could be between humans and devices or between devices itself. In fact, the data …
interaction could be between humans and devices or between devices itself. In fact, the data …