Cloud security issues and challenges: A survey

A Singh, K Chatterjee - Journal of Network and Computer Applications, 2017 - Elsevier
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …

Big healthcare data: preserving security and privacy

K Abouelmehdi, A Beni-Hessane, H Khaloufi - Journal of big data, 2018 - Springer
Big data has fundamentally changed the way organizations manage, analyze and leverage
data in any industry. One of the most promising fields where big data can be applied to make …

[PDF][PDF] Impact of controls on data integrity and information systems

S Duggineni - Science and Technology, 2023 - researchgate.net
Data has changed and revolutionized the world around us. With the amount of data use and
its need increasing every day, there comes an essential responsibility and a requirement of …

Recent security challenges in cloud computing

N Subramanian, A Jeyaraj - Computers & Electrical Engineering, 2018 - Elsevier
Cloud computing is an archetype that enables access to a shared pool of computing
resources for cloud users in an on-demand or pay-per-use, fashion. Cloud computing offers …

Big data privacy: a technological perspective and review

P Jain, M Gyanchandani, N Khare - Journal of Big Data, 2016 - Springer
Big data is a term used for very large data sets that have more varied and complex structure.
These characteristics usually correlate with additional difficulties in storing, analyzing and …

Security in cloud computing: Opportunities and challenges

M Ali, SU Khan, AV Vasilakos - Information sciences, 2015 - Elsevier
The cloud computing exhibits, remarkable potential to provide cost effective, easy to
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …

Decision tree and SVM-based data analytics for theft detection in smart grid

A Jindal, A Dua, K Kaur, M Singh… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Nontechnical losses, particularly due to electrical theft, have been a major concern in power
system industries for a long time. Large-scale consumption of electricity in a fraudulent …

Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors

T Oliveira, M Thomas, M Espadanal - Information & management, 2014 - Elsevier
Many factors influence the adoption of cloud computing. Organizations must systematically
evaluate these factors before deciding to adopt cloud-based solutions. To assess the …

Cloud computing research: A review of research themes, frameworks, methods and future research directions

PK Senyo, E Addae, R Boateng - International Journal of Information …, 2018 - Elsevier
This paper presents a meta-analysis of cloud computing research in information systems
with the aim of taking stock of literature and their associated research frameworks, research …

Big data security and privacy in healthcare: A Review

K Abouelmehdi, A Beni-Hssane, H Khaloufi… - Procedia Computer …, 2017 - Elsevier
The ever-increasing integration of highly diverse enabled data generating technologies in
medical, biomedical and healthcare fields and the growing availability of data at the central …