Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

Cloud security issues and challenges: A survey

A Singh, K Chatterjee - Journal of Network and Computer Applications, 2017 - Elsevier
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …

[PDF][PDF] Impact of controls on data integrity and information systems

S Duggineni - Science and Technology, 2023 - researchgate.net
Data has changed and revolutionized the world around us. With the amount of data use and
its need increasing every day, there comes an essential responsibility and a requirement of …

[PDF][PDF] Strategic Survey on Security and Privacy Methods of Cloud Computing Environment

SS Vellela, R Balamanigandan… - Journal of Next …, 2022 - jnxtgentech.com
This analysis implements a strategic review on cloud computing environment confidentiality
and privacy approaches. In an IT sector, the recently discovering phenomenal technology is …

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Security in cloud computing: Opportunities and challenges

M Ali, SU Khan, AV Vasilakos - Information sciences, 2015 - Elsevier
The cloud computing exhibits, remarkable potential to provide cost effective, easy to
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …

Privacy-preserving multi-keyword ranked search over encrypted cloud data

N Cao, C Wang, M Li, K Ren… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
With the advent of cloud computing, data owners are motivated to outsource their complex
data management systems from local sites to the commercial public cloud for great flexibility …

Privacy-preserving public auditing for secure cloud storage

C Wang, SSM Chow, Q Wang, K Ren… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
Using cloud storage, users can remotely store their data and enjoy the on-demand high-
quality applications and services from a shared pool of configurable computing resources …

Task scheduling algorithms for energy optimization in cloud environment: a comprehensive review

R Ghafari, FH Kabutarkhani, N Mansouri - Cluster Computing, 2022 - Springer
Cloud computing is very popular because of its unique features such as scalability, elasticity,
on-demand service, and security. A large number of tasks are performed simultaneously in a …

Enabling secure and efficient ranked keyword search over outsourced cloud data

C Wang, N Cao, K Ren, W Lou - IEEE Transactions on parallel …, 2011 - ieeexplore.ieee.org
Cloud computing economically enables the paradigm of data service outsourcing. However,
to protect data privacy, sensitive cloud data have to be encrypted before outsourced to the …