[HTML][HTML] A cloud-edge based data security architecture for sharing and analysing cyber threat information

DW Chadwick, W Fan, G Costantino… - Future generation …, 2020 - Elsevier
Cyber-attacks affect every aspect of our lives. These attacks have serious consequences,
not only for cyber-security, but also for safety, as the cyber and physical worlds are …

Big security for big data: Addressing security challenges for the big data infrastructure

Y Demchenko, C Ngo, C de Laat, P Membrey… - … Data Management: 10th …, 2014 - Springer
Big Data technologies are changing the traditional technology domains and their successful
use will require new security models and new security design approaches to address …

Security and privacy of sensitive data in cloud computing: a survey of recent developments

A Gholami, E Laure - arXiv preprint arXiv:1601.01498, 2016 - arxiv.org
Cloud computing is revolutionizing many ecosystems by providing organizations with
computing resources featuring easy deployment, connectivity, configuration, automation and …

Paasword: A holistic data privacy and security by design framework for cloud services

Y Verginadis, A Michalas, P Gouvas, G Schiefer… - Journal of Grid …, 2017 - Springer
Enterprises increasingly recognize the compelling economic and operational benefits from
virtualizing and pooling IT resources in the cloud. Nevertheless, the significant and valuable …

Two schemes of privacy-preserving trust evaluation

Z Yan, W Ding, V Niemi, AV Vasilakos - Future Generation Computer …, 2016 - Elsevier
Trust evaluation computes trust values by collecting and processing trust evidence. It plays
an important role in trust management that automatically ensures trust relationships among …

New approaches to security and availability for cloud data

A Juels, A Oprea - Communications of the ACM, 2013 - dl.acm.org
New approaches to security and availability for cloud data Page 1 64 communicaTionS of The
acm | february 2013 | vol. 56 | no. 2 contributed articles CloUD CoMPUtiNg is a service model …

Data security in the world of cloud computing

LM Kaufman - IEEE security & privacy, 2009 - ieeexplore.ieee.org
Today, we have the ability to utilize scalable, distributed computing environments within the
confines of the Internet, a practice known as cloud computing. In this new world of …

Ensuring security and privacy preservation for cloud data services

J Tang, Y Cui, Q Li, K Ren, J Liu, R Buyya - ACM Computing Surveys …, 2016 - dl.acm.org
With the rapid development of cloud computing, more and more enterprises/individuals are
starting to outsource local data to the cloud servers. However, under open networks and not …

Cybersecurity in big data era: From securing big data to data-driven security

DB Rawat, R Doku, M Garuba - IEEE Transactions on Services …, 2019 - ieeexplore.ieee.org
''Knowledge is power” is an old adage that has been found to be true in today's information
age. Knowledge is derived from having access to information. The ability to gather …

Ontological approach toward cybersecurity in cloud computing

T Takahashi, Y Kadobayashi, H Fujiwara - Proceedings of the 3rd …, 2010 - dl.acm.org
Widespread deployment of the Internet enabled building of an emerging IT delivery model,
ie, cloud computing. Albeit cloud computing-based services have rapidly developed, their …