The vulnerability of the production line using industrial IoT systems under ddos attack

T Horak, P Strelec, L Huraj, P Tanuska, A Vaclavova… - Electronics, 2021 - mdpi.com
Internet of Things (IoT) devices are not only finding increasing use in ordinary households,
but they have also become a key element for the Industry 4.0 concept. The implementation …

POSMETER: proof-of-stake blockchain for enhanced smart meter data security

D Singhal, L Ahuja, A Seth - International Journal of Information …, 2024 - Springer
As smart home appliances have grown in popularity; a large amount of data has been
created on smart meters pertaining to various consumers. Due to privacy concerns, these …

Security and privacy issues in cloud computing

BA Alenizi, M Humayun… - Journal of Physics …, 2021 - iopscience.iop.org
Abstract The idea of Cloud Computing (CC) provides dynamically scalable services that are
delivered over the Internet as a service. The key driver of the cloud is economic benefits, as …

[PDF][PDF] TAR-AFT: A Framework to Secure Shared Cloud Data with Group Management.

K Ambika, MB Moses - Intelligent Automation & Soft Computing, 2022 - cdn.techscience.cn
In addition to replacing desktop-based methods, cloud computing is playing a significant
role in several areas of data management. The health care industry, where so much data is …

RSA-CP-IDABE: a secure framework for multi-user and multi-owner cloud environment

S Chandel, G Yang, S Chakravarty - Information, 2020 - mdpi.com
Cloud has become one of the most widely used technologies to store data due to its
availability, flexibility, and low cost. At the same time, the security, integrity, and privacy of …

Privacy preserving mobile forensic framework using role‐based access control and cryptography

MF Hyder, S Arshad, A Arfeen… - … : Practice and Experience, 2022 - Wiley Online Library
The rise of social media‐related crimes has led to the rise of mobile forensics. Since mobile
forensics and privacy preservation are conflicting fields, it is important to find a middle …

Iot-Enabled Cloud Storage Data Access Control Algorithm Based on Blockchain Technology

HM Salman, NN Faris, I Ahmed… - … on Smart Systems …, 2024 - ieeexplore.ieee.org
Cloud-based data access control security systems (CSDA) are the most versatile and
elegant choice for SMEs and mid-sized enterprises. Storage, The idea of “the cloud” refers to …

[PDF][PDF] Control de accesos en seguridad de la información: Una revisión sistemática de las técnicas actuales

J Pacheco, J Chavez… - Campus, 2023 - portalrevistas.aulavirtualusmp.pe
En el dinámico escenario de la ciberseguridad actual, la gestión efectiva de accesos a
sistemas y datos críticos es fundamental para salvaguardar la integridad y confidencialidad …

A Novel Cloud Authentication Framework

LK ALnwihel, AR Khan - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
Cloud computing is a medium that provides cost reduction with storage and fast computation
environment. Various organization are marching to the cloud because of the several …

[PDF][PDF] Efficient and Secure Multi-Keyword Ranked Search and Group Data Sharing for Encrypted Cloud Data

SN Sarode, GR Chillarge - Journal of Scientific Research, 2022 - academia.edu
Nowadays due to the popularity of clouds and their quality services, many of the users such
as organizations, industries as well as individuals are migrating towards the cloud to store …