Results 31 to 40 of about 487,200 (366)

Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey

open access: yesElectronics, 2021
Cloud computing provides the flexible architecture where data and resources are dispersed at various locations and are accessible from various industrial environments. Cloud computing has changed the using, storing, and sharing of resources such as data,
Waqas Ahmad   +4 more
semanticscholar   +1 more source

Cloud Computing Security with Identity-Based Authentication Using Heritage-Based Technique [PDF]

open access: yes, 2017
More organizations start to give various types of distributed computing administrations for Internet clients in the meantime these administrations additionally bring some security issues.
Kapoor, R. K. (R), Sharma, R. K. (Rishi)
core   +1 more source

Security Concerns in Cloud Computing [PDF]

open access: yesInternational Journal of Trend in Scientific Research and Development, 2018
Cloud computing is a revolutionary way of storing and accessing data with five essential characteristics, three service models, and four deployment models. Businesses have realized the tremendous potentiality and benefits of cloud computing and have accepted the technology, but still a small amount of scepticism hovers around.
Gopal K. Shyam, Mir Abdul Samim Ansari
openaire   +2 more sources

Cyber resilience and cyber security issues of intelligent cloud computing systems

open access: yesResults in Control and Optimization, 2023
It is necessary to provide the cyber security of cloud computing according to the components that constitute its structure. The first step in advancing the cyber security of this technology is to accurately identify its threats.
Fargana Abdullayeva
doaj  

Blockchain-Based Privacy-Preserving Shop Floor Auditing Architecture

open access: yesIEEE Access
In the rapidly evolving realm of the Industrial Internet of Things (IIoT), securing shop floor operations, especially in audit processes, is of critical importance.
Fatemeh Stodt   +4 more
doaj   +1 more source

A Security Perspective on Adoption and Migration to Mobile Cloud Technology

open access: yesJOIV: International Journal on Informatics Visualization, 2017
Security is one of the main concerns of those who want to adopt and migrate to cloud computing technology. Security issues raised by cloud technology reveals that mobile cloud computing is raising the privacy and security issues such as identification ...
Mohammad Bin Ghudayyer   +2 more
doaj   +1 more source

Securing the Data in Clouds with Hyperelliptic Curve Cryptography

open access: yes, 2014
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay   +3 more
core   +1 more source

Recommendations and best practices for cloud enterprise security [PDF]

open access: yes, 2014
© 2014 IEEE. Enterprise security is essential to achieve global information security in business and organizations. Enterprise Cloud computing is a new paradigm for that enterprise where businesses need to be secured.
Chang, V, Ramachandran, M
core   +1 more source

Analysis and Practice of Cloud Computing Information Security

open access: yesDianxin kexue, 2013
Cloud computing security issue is one of the most important and difficult problems encountered in today’s cloud computing technology to promote 1anding.From the cloud computing security in the information security section,the basic content of information
Detian Tong   +3 more
doaj   +2 more sources

Secure Cloud Infrastructure: A Survey on Issues, Current Solutions, and Open Challenges

open access: yesApplied Sciences, 2021
Cloud computing is currently becoming a well-known buzzword in which business titans, such as Microsoft, Amazon, and Google, among others, are at the forefront in developing and providing sophisticated cloud computing systems to their users in a cost ...
Yara Alghofaili   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy