Cloud security threats and solutions: A survey

UA Butt, R Amin, M Mehmood, H Aldabbas… - Wireless Personal …, 2023 - Springer
Cloud computing is the on-demand availability of PC framework resources. Especially
information storage and handling power, without direct unique administration by the …

The roadmap to 6G security and privacy

P Porambage, G Gür, DPM Osorio… - IEEE Open Journal …, 2021 - ieeexplore.ieee.org
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the
visionaries of the 6th generation (6G) echo systems have already come into the discussion …

Ontologies in cloud computing—review and future directions

JB Agbaegbu, OT Arogundade, S Misra… - Future Internet, 2021 - mdpi.com
Cloud computing as a technology has the capacity to enhance cooperation, scalability,
accessibility, and offers discount prospects using improved and effective computing, and this …

Assessing information security risks in the cloud: A case study of Australian local government authorities

O Ali, A Shrestha, A Chatfield, P Murray - Government Information Quarterly, 2020 - Elsevier
Cloud computing enables cost-effective and scalable growth of IT services that can enhance
government services. Despite the Australian Federal Government's 'cloud-first'strategy and …

Verification and validation techniques for streaming big data analytics in internet of things environment

A Kumari, S Tanwar, S Tyagi, N Kumar - IET Networks, 2019 - Wiley Online Library
With an exponential growth of raw data generated from different sensors, actuators, and
mobile devices, data analytics is becoming a challenging issue keeping in view of the …

Leveraging big data analytics in 5G‐enabled IoT and industrial IoT for the development of sustainable smart cities

S Mukherjee, S Gupta, O Rawlley… - Transactions on …, 2022 - Wiley Online Library
There has been an exponential growth in the number of low‐cost heterogeneous sensor
devices that are connected to the internet in the existing infrastructure of smart cities in the …

Cyberattacks and security of cloud computing: a complete guideline

M Dawood, S Tu, C Xiao, H Alasmary, M Waqas… - Symmetry, 2023 - mdpi.com
Cloud computing is an innovative technique that offers shared resources for stock cache and
server management. Cloud computing saves time and monitoring costs for any organization …

Using identity‐based cryptography as a foundation for an effective and secure cloud model for e‐health

S Mittal, A Bansal, D Gupta, S Juneja… - Computational …, 2022 - Wiley Online Library
Nowadays, one of the most popular applications is cloud computing for storing data and
information through World Wide Web. Since cloud computing has become available, users …

On the continuous processing of health data in edge-fog-cloud computing by using micro/nanoservice composition

DD Sánchez-Gallegos, A Galaviz-Mosqueda… - IEEE …, 2020 - ieeexplore.ieee.org
The edge, the fog, the cloud, and even the end-user's devices play a key role in the
management of the health sensitive content/data lifecycle. However, the creation and …

[图书][B] 6G Frontiers: Towards Future Wireless Systems

C De Alwis, QV Pham, M Liyanage - 2022 - books.google.com
6G Frontiers Enables readers to understand the exciting new technologies, architectural
directions, technical aspects, and applications of 6G, plus legal and standardization …