An exhaustive review on security issues in cloud computing

S Fatima, S Ahmad - KSII Transactions on Internet and Information …, 2019 - koreascience.kr
Abstract The Cloud Computing is growing rapidly in the current IT industry. Cloud computing
has become a buzzword in relation to Grid & Utility computing. It provides on demand …

Secure serverless computing using dynamic information flow control

K Alpernas, C Flanagan, S Fouladi, L Ryzhyk… - Proceedings of the …, 2018 - dl.acm.org
The rise of serverless computing provides an opportunity to rethink cloud security. We
present an approach for securing serverless systems using a novel form of dynamic …

A comprehensive study of challenges and issues in cloud computing

S Siddiqui, M Darbari, D Yagyasen - Soft Computing and Signal …, 2019 - Springer
Cloud computing is a technology which provides the capability to use storage resources and
computing services via Internet. Performance and resource management are a challenging …

LUCON: Data flow control for message-based IoT systems

J Schütte, GS Brost - … conference on trust, security and privacy …, 2018 - ieeexplore.ieee.org
Today's emerging Industrial Internet of Things (IIoT) scenarios are characterized by the
exchange of data between services across enterprises. Traditional access and usage …

[HTML][HTML] The unresolved need for dependable guarantees on security, sovereignty, and trust in data ecosystems

J Lohmöller, J Pennekamp, R Matzutt… - Data & Knowledge …, 2024 - Elsevier
Data ecosystems emerged as a new paradigm to facilitate the automated and massive
exchange of data from heterogeneous information sources between different stakeholders …

[PDF][PDF] On the need for strong sovereignty in data ecosystems

J Lohmöller, J Pennekamp, R Matzutt… - DEco …, 2022 - publications.rwth-aachen.de
Data ecosystems are the foundation of emerging data-driven business models as they (i)
enable an automated exchange between their participants and (ii) provide them with access …

Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things

J Singh, T Pasquier, J Bacon, J Powles… - Proceedings of the 17th …, 2016 - dl.acm.org
Internet of Things (IoT) applications, systems and services are subject to law. We argue that
for the IoT to develop lawfully, there must be technical mechanisms that allow the …

Cppl: Compact privacy policy language

M Henze, J Hiller, S Schmerling, JH Ziegeldorf… - Proceedings of the …, 2016 - dl.acm.org
Recent technology shifts such as cloud computing, the Internet of Things, and big data lead
to a significant transfer of sensitive data out of trusted edge networks. To counter resulting …

Towards tracking data flows in cloud architectures

I Kunz, V Casola, A Schneider… - 2020 IEEE 13th …, 2020 - ieeexplore.ieee.org
As cloud services become central in an increasing number of applications, they process and
store more personal and business-critical data. At the same time, privacy and compliance …

Multi-level models for data security in networks and in the Internet of things

L Logrippo - Journal of Information Security and Applications, 2021 - Elsevier
Data flow control for security is a mature research area in computer security, and its
established results can be adapted to the newer area of data security in the Internet of things …