A systematic literature review on cloud computing security: threats and mitigation strategies

B Alouffi, M Hasnain, A Alharbi, W Alosaimi… - Ieee …, 2021 - ieeexplore.ieee.org
Cloud computing has become a widely exploited research area in academia and industry.
Cloud computing benefits both cloud services providers (CSPs) and consumers. The …

Cloud security threats and solutions: A survey

UA Butt, R Amin, M Mehmood, H Aldabbas… - Wireless Personal …, 2023 - Springer
Cloud computing is the on-demand availability of PC framework resources. Especially
information storage and handling power, without direct unique administration by the …

Digital transformation and industry 4.0 employees: Empirical evidence from top digital nations

K Nadeem, SI Wong, S Za, M Venditti - Technology in Society, 2024 - Elsevier
As the central part of Industry 4.0 (I4. 0), Digital Transformation (DT) is being enthusiastically
implemented in business organisations. Current DT literature has focused on business and …

[HTML][HTML] A survey on modern cloud computing security over smart city networks: Threats, vulnerabilities, consequences, countermeasures, and challenges

AI Tahirkheli, M Shiraz, B Hayat, M Idrees, A Sajid… - Electronics, 2021 - mdpi.com
Cloud Computing (CC) is a promising technology due to its pervasive features, such as
online storage, high scalability, and seamless accessibility, in that it plays an important role …

Enhancing the security of exchanging and storing DICOM medical images on the cloud

O Dorgham, B Al-Rahamneh, A Almomani… - International Journal of …, 2018 - igi-global.com
Medical image information can be exchanged remotely through cloud-based medical
imaging services. Digital Imaging and Communication in Medicine (DICOM) is considered to …

Exploring users' experiences of using personal cloud storage services: a phenomenological study

K Ghaffari, M Lagzian - Behaviour & Information Technology, 2018 - Taylor & Francis
Recently, cloud computing has attracted great attention for both personal and organisational
usages. Despite a large number of research conducted about cloud adoption, little is known …

A survey on cloud computing approaches

R Singh, R Mishra, RN Aher, A Ghosal… - … Security and Artificial …, 2023 - ieeexplore.ieee.org
Today, cloud computing research is widely utilised in both industry and academia. Cloud
computing (CC) benefits both users and cloud service providers (CSPs). The security …

A detailed review of cloud security: issues, threats & attacks

A Patel, N Shah, D Ramoliya… - 2020 4th International …, 2020 - ieeexplore.ieee.org
Cloud computing is considered as an on-demand delivery of services in which applications
and infrastructure are allocated to users as metered services over networks. Cloud …

Threat landscape of next generation IoT-enabled smart grids

T Mavroeidakos, V Chaldeakis - … and Innovations. AIAI 2020 IFIP WG 12.5 …, 2020 - Springer
Abstract The Smart Grids (SGs) consist of an emerging paradigm that pave the way for the
power grids' modernization and seek novel techniques for improving the transmittion and …

An authentication technique for accessing de-duplicated data from private cloud using one time password

P Mohan, S Chelliah - Cloud Security: Concepts, Methodologies …, 2019 - igi-global.com
Objective: The main aim is to de-duplicate the redundant files in the cloud and also to
improve the security of files in public cloud service by assigning privileges to the documents …