Secure cloud infrastructure: A survey on issues, current solutions, and open challenges

Y Alghofaili, A Albattah, N Alrajeh, MA Rassam… - Applied Sciences, 2021 - mdpi.com
Cloud computing is currently becoming a well-known buzzword in which business titans,
such as Microsoft, Amazon, and Google, among others, are at the forefront in developing …

Information security risks, benefits, and mitigation measures in cloud sourcing

F Wulf, S Strahringer, M Westner - 2019 IEEE 21st Conference …, 2019 - ieeexplore.ieee.org
This paper develops a categorization of cloud security risks, elaborates how they impact
information security, and discusses potential security benefits from cloud sourcing. This …

[PDF][PDF] Authentication, authorization and accounting with Ethereum blockchain

M Thakur - Helsingfors universitet, 2017 - helda.helsinki.fi
Most of us access cloud services almost on daily basis. For example, we use web-based
email systems such as Gmail, Outlook, Yahoo! to exchange messages with each other. We …

A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud

BB Ehuil, C Chen, S Wang, H Guo… - Chinese Journal of …, 2024 - ieeexplore.ieee.org
Because of the increasing number of threats in the IoT cloud, an advanced security
mechanism is needed to guard data against hacking or attacks. A user authentication …

Security challenges from abuse of cloud service threat

I Ahmad, H Bakht - … Journal of Computing and Digital Systems, 2019 - journal.uob.edu.bh
Cloud computing is an ever-growing technology that leverages dynamic and versatile
provision of computational resources and services. In spite of countless benefits that cloud …

A dynamic risk-based access control approach: model and implementation

S Savinov - 2017 - uwspace.uwaterloo.ca
Access control (AC) refers to mechanisms and policies that restrict access to resources, thus
regulating access to physical or virtual resources of an information system. AC approaches …

Security Risk Assessment on Cloud: A Systematic Mapping Study

G Annunziata, A Sheykina, F Palomba… - Proceedings of the 28th …, 2024 - dl.acm.org
Cloud computing has become integral to modern organizational operations, offering
efficiency and agility. However, security challenges such as data loss and downtime …

Governing Cloud computing services: Risks and mitigating controls

M Mertens, S De Haes, T Huygh - The Routledge Companion to …, 2020 - taylorfrancis.com
An increasing shift towards agile enterprises results into an increasing importance of IT
outsourcing, amongst which Cloud computing services are used to obtain scalability and …

Recent Developments in Cloud Computing Environment: Current Challenges and Future Prospects

A Jaiswal, MK Rai, R Saha… - 2019 3rd International …, 2019 - ieeexplore.ieee.org
Cloud computing provides various services which have changed the concept of information
storage and retrieval recently. The benefits of cloud environments have arisen a …

Security Threats and Their Mitigations in IoT Devices

S Gupta, N Lingareddy - Techno-Societal 2020: Proceedings of the 3rd …, 2021 - Springer
Internet of things (IoT) is another worldview converging with the social networks, permitting
data sharing between the individuals and electronic gadgets. Likewise, it is expected for …