CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha +16 more
core +3 more sources
An Overview of Fog Computing and Edge Computing Security and Privacy Issues
With the advancement of different technologies such as 5G networks and IoT the use of different cloud computing technologies became essential. Cloud computing allowed intensive data processing and warehousing solution.
Ahmed M. Alwakeel
doaj +1 more source
AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption [PDF]
Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. However, those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned
Jung, Taeho +3 more
core +1 more source
Cloud Computing Issues, Challenges, and Needs: A Survey
Cloud computing represents a kind of computing that is based on the sharing of computing resources instead of possessing personal devices or local servers for handling several applications and tasks.
Mohammad Aljanabi +6 more
doaj +1 more source
Traditional security risk assessment methods in cloud computing environment: usability analysis [PDF]
The term "Cloud Computing" has become very common in our daily life. Cloud computing has emerged with promises to decrease the cost of computing implementation and deliver the computing as service, where the clients pay only for what he needed and used ...
Ahmed, Azuan +4 more
core +2 more sources
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya +12 more
core +1 more source
A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi +5 more
doaj +1 more source
Recommendations and best practices for cloud enterprise security [PDF]
© 2014 IEEE. Enterprise security is essential to achieve global information security in business and organizations. Enterprise Cloud computing is a new paradigm for that enterprise where businesses need to be secured.
Chang, V, Ramachandran, M
core +1 more source
Blockchain-Based Privacy-Preserving Shop Floor Auditing Architecture
In the rapidly evolving realm of the Industrial Internet of Things (IIoT), securing shop floor operations, especially in audit processes, is of critical importance.
Fatemeh Stodt +4 more
doaj +1 more source
Securing the Data in Clouds with Hyperelliptic Curve Cryptography
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay +3 more
core +1 more source

