Blockchain-empowered cloud architecture based on secret sharing for smart city

J Cha, SK Singh, TW Kim, JH Park - Journal of Information Security and …, 2021 - Elsevier
Recent advances in information technology go beyond the simple convenience offered to
individuals, leading to smart city technology that provides urban facilities and better quality …

PRISMA Archetype‐Based Systematic Literature Review of Security Algorithms in the Cloud

J Kwao Dawson, F Twum… - Security and …, 2023 - Wiley Online Library
Industries have embraced cloud computing for their daily operations due to the volume of
data they create. As data generation and consumption have increased, the challenges and …

Attribute-based approaches for secure data sharing in industrial contexts

A Chiquito, U Bodin, O Schelén - IEEE Access, 2023 - ieeexplore.ieee.org
The sharing of data is becoming increasingly important for the process and manufacturing
industries that are using data-driven models and advanced analysis to assess production …

Enhancing Security of Mobile Cloud Computing by Trust‐and Role‐Based Access Control

AM Abdul, AAK Mohammad… - Scientific …, 2022 - Wiley Online Library
The tremendous development in mobile technology attracts users' attention. Thus, the users
are shifting from traditional computational devices to smartphones and tablets, and because …

[PDF][PDF] A novel hybrid approach for access control in cloud computing

S Alayda, NA Almowaysher, M Humayun… - Int. J. Eng. Res …, 2020 - seap.taylors.edu.my
Access control is essential to protect data and system resources by preventing unauthorized
access. Cloud computing ensures that users get benefit from such resources by following …

[PDF][PDF] OTP-Based Software-Defined Cloud Architecture for Secure Dynamic Routing.

TW Kim, Y Pan, JH Park - Computers, Materials & Continua, 2022 - academia.edu
In the current era, anyone can freely access the Internet thanks to the development of
information and communication technology. The cloud is attracting attention due to its ability …

Security improvement of file system filter driver in windows embedded OS

YS Seong, C Cho, YP Jun, Y Won - Journal of Information …, 2021 - koreascience.kr
IT security companies have been releasing file system filter driver security solutions based
on the whitelist, which are being used by several enterprises in the relevant industries …

Access control based on ciphertext attribute authentication and threshold policy for the internet of things

Q Zhang, Y Li, Z Li, J Yuan, Y Gan, X Luo - Sensors, 2019 - mdpi.com
The development of the Internet of Things has led to great development of data sharing and
data interaction, which has made security and privacy more and more a concern for users …

[HTML][HTML] A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment

K Rangappa, AKB Ramaswamy, M Prasad, SA Kumar - Cryptography, 2024 - mdpi.com
In the era of cloud computing, guaranteeing the safety and effectiveness of data
management is of utmost importance. This investigation presents a novel approach that …

A Miniscule and Self-Adaptive Autoregressive Dragonfly Optimization for Secrecy Conserved Data Publication in Mobile Cloud Computing

R Mishra - SN Computer Science, 2023 - Springer
An intelligent system that improves the mobile apps that users may access from their mobile
devices for a variety of tasks, Mobile Cloud Computing (MCC) is on the rise. The MCC …