Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

An ontology for privacy requirements via a systematic literature review

M Gharib, P Giorgini, J Mylopoulos - Journal on Data Semantics, 2020 - Springer
Privacy has emerged as a key concern for business and social computing as security
breaches have compromised personal data for millions. Despite this, much of existing work …

[引用][C] Handbook of Cloud Computing: Basic to Advance research on the concepts and design of Cloud Computing

A Nayyar - 2019 - books.google.com
Great POSSIBILITIES and high future prospects to become ten times folds in the near
FUTURE DESCRIPTION The book ÒHandbook of Cloud ComputingÓ provides the latest …

Perceptions of ICT practitioners regarding software privacy

E Dias Canedo, A Toffano Seidel Calazans… - Entropy, 2020 - mdpi.com
During software development activities, it is important for Information and Communication
Technology (ICT) practitioners to know and understand practices and guidelines regarding …

A readiness model for security requirements engineering

Y Mufti, M Niazi, M Alshayeb, S Mahmood - IEEE Access, 2018 - ieeexplore.ieee.org
The focus on secure software development has been growing steadily in all phases of the
software development life cycle. Security awareness in the requirements engineering stage …

A framework for cloud based e-government from the perspective of developing countries

PR Joshi, S Islam, S Islam - Future Internet, 2017 - mdpi.com
Despite significant efforts to initiate electronic government projects, developing countries are
still struggling to reap the benefits of using e-government services. An effective …

Threat-specific security risk evaluation in the cloud

A Nhlabatsi, JB Hong, DS Kim… - … on Cloud Computing, 2018 - ieeexplore.ieee.org
Existing security risk evaluation approaches (eg, asset-based) do not consider specific
security requirements of individual cloud computing clients in the security risk evaluation. In …

Secure and fine-grained self-controlled outsourced data deletion in cloud-based IoT

J Hao, J Liu, W Wu, F Tang… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The emerging cloud-based Internet of Things (IoT) paradigm enables IoT devices to directly
upload their collected data to the remote cloud and allows data owners (DOs) to …

Privacy regulation aware service selection for multi-provision cloud service composition

L Liu, H Zhu, S Chen, Z Huang - Future Generation Computer Systems, 2022 - Elsevier
The proliferation of cloud computing is driving the rapid growth of multi-provision cloud
service composition (MPCSC), in which each cloud service provider (CSP) can offer multiple …

An ECC-based mutual data access control protocol for next-generation public cloud

N Khan, Z Jianbiao, H Lim, J Ali, I Ullah… - Journal of Cloud …, 2023 - Springer
Through the broad usage of cloud computing and the extensive utilization of next-generation
public clouds, people can share valuable information worldwide via a wireless medium …