A survey of security in cloud, edge, and fog computing

A Ometov, OL Molua, M Komarov, J Nurmi - Sensors, 2022 - mdpi.com
The field of information security and privacy is currently attracting a lot of research interest.
Simultaneously, different computing paradigms from Cloud computing to Edge computing …

A review of machine learning algorithms for cloud computing security

UA Butt, M Mehmood, SBH Shah, R Amin, MW Shaukat… - Electronics, 2020 - mdpi.com
Cloud computing (CC) is on-demand accessibility of network resources, especially data
storage and processing power, without special and direct management by the users. CC …

A survey on cloud computing security: Issues, threats, and solutions

S Singh, YS Jeong, JH Park - Journal of Network and Computer …, 2016 - Elsevier
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand
services to consumers with greater flexibility in a cost effective manner. While moving …

Security concerns and solutions for enterprise cloud computing applications

AR Kunduru - Asian Journal of Research in Computer …, 2023 - article.researchpromo.com
Computing in the cloud is now one of the most interesting developments in technology
owing to the fact that it is both flexible and cost-effective. Despite the enormous stakes, the …

Cloud security threats and solutions: A survey

UA Butt, R Amin, M Mehmood, H Aldabbas… - Wireless Personal …, 2023 - Springer
Cloud computing is the on-demand availability of PC framework resources. Especially
information storage and handling power, without direct unique administration by the …

[PDF][PDF] Cloud computing and security issues in the cloud

M Ahmed, MA Hossain - … Journal of Network Security & Its …, 2014 - wanivipin.wordpress.com
Cloud computing has formed the conceptual and infrastructural basis for tomorrow's
computing. The global computing infrastructure is rapidly moving towards cloud based …

[PDF][PDF] A survey of cyber attack detection strategies

J Raiyn - International Journal of Security and Its Applications, 2014 - academia.edu
Homeland security field deals with diverse subjects, audio processing, video surveillance,
image detection, geolocation determination, and cyber attack detection. Audio processing …

Cloud computing risk assessment: a systematic literature review

R Latif, H Abbas, S Assar, Q Ali - Future Information Technology …, 2014 - Springer
Cloud computing security is a broad research domain with a large number of concerns,
ranging from protecting hardware and platform technologies to protecting clouds data and …

5G privacy: Scenarios and solutions

M Liyanage, J Salo, A Braeken, T Kumar… - 2018 IEEE 5G World …, 2018 - ieeexplore.ieee.org
The next mobile generation, 5G, is expected to bring an enormous amount of new services
and increased user experience. However adequate protection mechanisms for data and …

Cyber security threats, challenges and defence mechanisms in cloud computing

A Aljumah, TA Ahanger - IET communications, 2020 - Wiley Online Library
With the advent of computers and their widespread use, cloud computing has been
identified as one of the major emerging components of computer technology. The benefits of …