Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …

[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …

A decentralized replica placement algorithm for edge computing

A Aral, T Ovatman - IEEE transactions on network and service …, 2018 - ieeexplore.ieee.org
As the devices that make up the Internet become more powerful, algorithms that orchestrate
cloud systems are on the verge of putting more responsibility for computation and storage on …

A collaborative mobile edge computing and user solution for service composition in 5G systems

I Al Ridhawi, M Aloqaily, Y Kotb… - Transactions on …, 2018 - Wiley Online Library
Mobile edge computing (MEC) is an emergent technology that has revolutionized traditional
cloud service solutions. Mobile edge computing extends cloud computing by providing …

Improving load balancing for data-duplication in big data cloud computing networks

A Javadpour, AMH Abadi, S Rezaei, M Zomorodian… - Cluster …, 2022 - Springer
Data transmission and retrieval in a cloud computing environment are usually handled by
storage device providers or physical storage units leased by third parties. Improving network …

Scalable data storage design for nonstationary IoT environment with adaptive security and reliability

A Tchernykh, M Babenko, N Chervyakov… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) environment has a dynamic nature with high risks of confidentiality,
integrity, and availability violations. The loss of information, denial of access, information …

A data replication strategy with tenant performance and provider economic profit guarantees in Cloud data centers

R Mokadem, A Hameurlain - Journal of Systems and Software, 2020 - Elsevier
Meeting tenant performance requirements through data replication while ensuring an
economic profit is very challenging for cloud providers. For this purpose, we propose a data …

A review of data replication based on meta-heuristics approach in cloud computing and data grid

N Mansouri, MM Javidi - Soft computing, 2020 - Springer
Heterogeneous distributed computing environments are emerging for developing data-
intensive (big data) applications that require to access huge data files. Therefore, effective …

DaSCE: Data security for cloud environment with semi-trusted third party

M Ali, SUR Malik, SU Khan - IEEE Transactions on Cloud …, 2015 - ieeexplore.ieee.org
Off-site data storage is an application of cloud that relieves the customers from focusing on
data storage system. However, outsourcing data to a third-party administrative control entails …

A multi-objective optimized replication using fuzzy based self-defense algorithm for cloud computing

N Mansouri, BMH Zade, MM Javidi - Journal of Network and Computer …, 2020 - Elsevier
Cloud computing has attracted increasing attention in data management. Data replication,
which brings files closer to the data consumers, is a well-known technique that reduces …