[HTML][HTML] A survey of security in cloud, edge, and fog computing

A Ometov, OL Molua, M Komarov, J Nurmi - Sensors, 2022 - mdpi.com
The field of information security and privacy is currently attracting a lot of research interest.
Simultaneously, different computing paradigms from Cloud computing to Edge computing …

Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

The convergence and interplay of edge, fog, and cloud in the AI-driven Internet of Things (IoT)

F Firouzi, B Farahani, A Marinšek - Information Systems, 2022 - Elsevier
Abstract The Internet of Things (IoT) tsunami, public embracement, and the ubiquitous
adoption of smart devices are affecting virtually every industry, directly or indirectly. The …

A survey on industry 4.0 for the oil and gas industry: Upstream sector

O Elijah, PA Ling, SKA Rahim, TK Geok, A Arsad… - IEEE …, 2021 - ieeexplore.ieee.org
The market volatility in the oil and gas (O&G) sector, the dwindling demand for oil due to the
impact of COVID-19, and the push for alternative greener energy are driving the need for …

[HTML][HTML] Deep neural networks in the cloud: Review, applications, challenges and research directions

KY Chan, B Abu-Salih, R Qaddoura, AZ Ala'M… - Neurocomputing, 2023 - Elsevier
Deep neural networks (DNNs) are currently being deployed as machine learning technology
in a wide range of important real-world applications. DNNs consist of a huge number of …

[HTML][HTML] A Confidentiality-based data Classification-as-a-Service (C2aaS) for cloud security

M Ali, LT Jung, AH Sodhro, AA Laghari… - Alexandria Engineering …, 2023 - Elsevier
Rapid development and massive use of Information Technology (IT) have since produced a
massive amount of electronic data. In tandem, the demand for data outsourcing and the …

[PDF][PDF] Symmetric encryption algorithms: Review and evaluation study

MN Alenezi, H Alabdulrazzaq… - International Journal of …, 2020 - researchgate.net
The increased exchange of data over the Internet in the past two decades has brought data
security and confidentiality to the fore front. Information security can be achieved by …

Challenges and remedies to privacy and security in aigc: Exploring the potential of privacy computing, blockchain, and beyond

C Chen, Z Wu, Y Lai, W Ou, T Liao, Z Zheng - arXiv preprint arXiv …, 2023 - arxiv.org
Artificial Intelligence Generated Content (AIGC) is one of the latest achievements in AI
development. The content generated by related applications, such as text, images and …

[HTML][HTML] A systematic literature Review: Risk analysis in cloud migration

B Soewito, FL Gaol, E Abdurachman - Journal of King Saud University …, 2022 - Elsevier
The era of the industrial revolution 4.0 was an era marked by the transition of information
and communication technology that was able to create new technology-based investments …

Detection and prevention mechanisms for DDoS attack in cloud computing environment

S Potluri, M Mangla, S Satpathy… - 2020 11th international …, 2020 - ieeexplore.ieee.org
For optimal use of cloud resources and to reduce the latency of cloud users, the cloud
computing model extends the services such as networking facilities, computational …