[HTML][HTML] Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing

S Ali, SA Wadho, A Yichiet, ML Gan, CK Lee - Egyptian Informatics Journal, 2024 - Elsevier
Cloud computing security and data protection are becoming increasingly critical as its use
increases. The research we present demonstrates how undercover sharing techniques and …

Integrating wireless sensor networks with cloud computing

K Ahmed, M Gregory - … conference on mobile ad-hoc and …, 2011 - ieeexplore.ieee.org
Wireless Sensor Networks (WSN) has been a focus for research for several years. WSN
enables novel and attractive solutions for information gathering across the spectrum of …

Prioritization of information security controls through fuzzy AHP for cloud computing networks and wireless sensor networks

MI Tariq, S Ahmed, NA Memon, S Tayyaba, MW Ashraf… - Sensors, 2020 - mdpi.com
With the advent of cloud computing and wireless sensor networks, the number of
cyberattacks has rapidly increased. Therefore, the proportionate security of networks has …

Cloud computing security: challenges and future trends

T Radwan, MA Azer… - International Journal of …, 2017 - inderscienceonline.com
Cloud computing is one of the most trendy terminologies. Cloud providers aim to satisfy
clients' requirements for computing resources such as services, applications, networks …

A survey of common security vulnerabilities and corresponding countermeasures for SaaS

D Kim, MA Vouk - 2014 IEEE Globecom Workshops (GC …, 2014 - ieeexplore.ieee.org
Software as a Service (SaaS) is the most prevalent service delivery mode for cloud systems.
This paper surveys common security vulnerabilities and corresponding countermeasures for …

A new framework to integrate wireless sensor networks with cloud computing

SH Shah, FK Khan, W Ali, J Khan - 2013 IEEE aerospace …, 2013 - ieeexplore.ieee.org
Wireless sensors networks have several applications of their own. These applications can
further enhanced by integrating a local wireless sensor network to internet, which can be …

Remote health monitoring through an integration of wireless sensor networks, mobile phones & cloud computing technologies

SH Shah, A Iqbal, SSA Shah - 2013 IEEE Global Humanitarian …, 2013 - ieeexplore.ieee.org
Wireless sensor networks have several applications of direct and indirect benefit to
humanity. These applications can be further enhanced by integrating local wireless sensor …

TrustRBAC: Trust role based access control model in multi-domain cloud environments

C Uikey, DS Bhilare - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Cloud computing is one of the most leading paradigms in information technology. It offers
various cost-effective information technology services over the internet. To keep each entity …

TCloud: a dynamic framework and policies for access control across multiple domains in cloud computing

S Ullah, Z Xuefeng, Z Feng - arXiv preprint arXiv:1305.2865, 2013 - arxiv.org
In a cloud computing environment, access control policy is an effective means of fortification
cloud users and cloud resources services against security infringements. Based on analysis …

Unlocking the Power of Azure AD: Best Practices for Enterprise Identity Control

R Michael, J Sarah - International Journal of Trend in Scientific …, 2019 - eprints.umsida.ac.id
In today's rapidly evolving digital landscape, managing enterprise identity has become a
critical challenge for organizations. Azure Active Directory (Azure AD) offers a robust …