Results 31 to 40 of about 502,338 (367)

A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography

open access: yesItalian National Conference on Sensors, 2022
Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly.
Rose Adee, H. Mouratidis
semanticscholar   +1 more source

An Overview of Fog Computing and Edge Computing Security and Privacy Issues

open access: yesSensors, 2021
With the advancement of different technologies such as 5G networks and IoT the use of different cloud computing technologies became essential. Cloud computing allowed intensive data processing and warehousing solution.
Ahmed M. Alwakeel
doaj   +1 more source

Security and Privacy Aspects of Cloud Computing: A Smart Campus Case Study

open access: yesIntelligent Automation and Soft Computing, 2022
: The trend of cloud computing is accelerating along with emerging technologies such as utility computing, grid computing, and distributed computing.
Sajid Habib Gill   +7 more
semanticscholar   +1 more source

Traditional security risk assessment methods in cloud computing environment: usability analysis [PDF]

open access: yes, 2014
The term "Cloud Computing" has become very common in our daily life. Cloud computing has emerged with promises to decrease the cost of computing implementation and deliver the computing as service, where the clients pay only for what he needed and used ...
Ahmed, Azuan   +4 more
core   +2 more sources

Cloud Computing Issues, Challenges, and Needs: A Survey

open access: yesJOIV: International Journal on Informatics Visualization, 2021
Cloud computing represents a kind of computing that is based on the sharing of computing resources instead of possessing personal devices or local servers for handling several applications and tasks.
Mohammad Aljanabi   +6 more
doaj   +1 more source

Security of Zero Trust Networks in Cloud Computing: A Comparative Review

open access: yesSustainability, 2022
Recently, networks have shifted from traditional in-house servers to third-party-managed cloud platforms due to its cost-effectiveness and increased accessibility toward its management.
Sirshak Sarkar   +4 more
semanticscholar   +1 more source

AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption [PDF]

open access: yes, 2013
Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. However, those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned
Jung, Taeho   +3 more
core   +1 more source

Recommendations and best practices for cloud enterprise security [PDF]

open access: yes, 2014
© 2014 IEEE. Enterprise security is essential to achieve global information security in business and organizations. Enterprise Cloud computing is a new paradigm for that enterprise where businesses need to be secured.
Chang, V, Ramachandran, M
core   +1 more source

Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]

open access: yes, 2015
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya   +12 more
core   +1 more source

Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey

open access: yesElectronics, 2021
Cloud computing provides the flexible architecture where data and resources are dispersed at various locations and are accessible from various industrial environments. Cloud computing has changed the using, storing, and sharing of resources such as data,
Waqas Ahmad   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy