[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

OI Abiodun, M Alawida, AE Omolara… - Journal of King Saud …, 2022 - Elsevier
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …

A survey on threat-modeling techniques: protected objects and classification of threats

A Konev, A Shelupanov, M Kataev, V Ageeva… - Symmetry, 2022 - mdpi.com
Information security is one of the most important attributes of distributed systems that often
operate on unreliable networks. Enabling security features during the development of a …

[HTML][HTML] Hadoop-based secure storage solution for big data in cloud computing environment

S Guan, C Zhang, Y Wang, W Liu - Digital Communications and Networks, 2024 - Elsevier
In order to address the problems of the single encryption algorithm, such as low encryption
efficiency and unreliable metadata for static data storage of big data platforms in the cloud …

Big data handling approach for unauthorized cloud computing access

A Razaque, N Shaldanbayeva, B Alotaibi, M Alotaibi… - Electronics, 2022 - mdpi.com
Nowadays, cloud computing is one of the important and rapidly growing services; its
capabilities and applications have been extended to various areas of life. Cloud computing …

Hybrid energy-efficient algorithm for efficient internet of things deployment

A Razaque, Y Jararweh, B Alotaibi, M Alotaibi… - … Informatics and Systems, 2022 - Elsevier
Mobile cloud computing (MCC) plays a significant role in obtaining virtualized data stored on
cloud servers without additional waiting time. However, the limited battery power of mobile …

[PDF][PDF] A hybrid solution for secure privacy-preserving cloud storage & information retrieval

A Kumar, T Aljrees, SY Hsieh, KU Singh… - Human-centric …, 2023 - researchgate.net
Cloud storage is an emerging archetype used by businesses for data storage. Clients
require easy access to data in the cloud, which helps clients with limited computing power …

An Intelligent Lightweight Signing Signature and Secured Jellyfish Data Aggregation (LS3JDA) Based Privacy Preserving Model in Cloud

SP Rathinaeswari, V Santhi - New Generation Computing, 2024 - Springer
Developing a secured and accurate disease diagnosis framework in the healthcare cloud
systems are still remains one of the crucial problems in recent times. Due to the rapid growth …

[图书][B] A Generic Approach for the Automated Notarization of Cloud Configurations Using Blockchain-Based Trust

T Weber - 2023 - Springer
Economists generally consider the world to be in the midst of a fourth industrial revolution
characterized by increased interconnectivity, computerization, and artificial intelligence (M …

Cloud computing security, risk, and challenges: a detailed analysis of preventive measures and applications

A Sinha, NK Singh, A Srivastava… - … intelligence, big data …, 2023 - Wiley Online Library
Cloud computing is an emerging technology for networking and virtual database extension,
which is being adopted by several enterprises widely. Nowadays, every single enterprise is …

Protection of Network Security Selector Secrecy in Outsourced Network Testing

S Alasmari, W Wang, A Lu… - 2023 32nd International …, 2023 - ieeexplore.ieee.org
With the emergence and fast development of cloud computing and outsourced services,
more and more companies start to use managed security service providers (MSSP) as their …