[HTML][HTML] A systematic literature Review: Risk analysis in cloud migration

B Soewito, FL Gaol, E Abdurachman - Journal of King Saud University …, 2022 - Elsevier
The era of the industrial revolution 4.0 was an era marked by the transition of information
and communication technology that was able to create new technology-based investments …

[PDF][PDF] A systematic review on cloud computing

M Haris, RZ Khan - International Journal of Computer Sciences …, 2018 - researchgate.net
Cloud Computing is the fastest growing technology in the IT world. It is an architecture which
combined the concept of Virtualization technology with several computing paradigms such …

An empirical client cloud environment to secure data communication with alert protocol

D Soni, D Srivastava, A Bhatt… - Mathematical …, 2022 - Wiley Online Library
Cloud computing is a technology that provides resources and utility services based on user
demand. Due to this demand, efficient cloud security protocols are highly required …

Provisioning trust-oriented role-based access control for maintaining data integrity in cloud

UR Saxena, T Alam - … Journal of System Assurance Engineering and …, 2023 - Springer
Cloud computing platforms have been one of the best sources for resource computation and
service recommendations in the recent years. Users' reliance on the cloud has increased …

Cloud integrated iot enabled sensor network security: research issues and solutions

R Geetha, AK Suntheya, GU Srikanth - Wireless Personal Communications, 2020 - Springer
Security of cloud computing and Internet of things (IoT) enabled sensor networks are two
significant areas of research that have a great impact in developing numerous societal …

Security and privacy issues in cloud computing

BA Alenizi, M Humayun… - Journal of Physics …, 2021 - iopscience.iop.org
Abstract The idea of Cloud Computing (CC) provides dynamically scalable services that are
delivered over the Internet as a service. The key driver of the cloud is economic benefits, as …

Toward the future—upgrading existing remote monitoring concepts to IIoT concepts

SD Milić, BM Babić - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The futuristic idea of smart factories should take into account existing industrial facilities and
the practical application of IIoT in them. The greatest benefits from the implementation of IIoT …

A secure mutual authentication protocol based on visual cryptography technique for IoT-Cloud

BB Ehuil, C Chen, S Wang, H Guo… - Chinese Journal of …, 2024 - ieeexplore.ieee.org
Because of the increasing number of threats in the IoT cloud, an advanced security
mechanism is needed to guard data against hacking or attacks. A user authentication …

[PDF][PDF] Analysis of the effectiveness of cloud control matrix for hybrid cloud computing

MI Tariq - … Journal of Future Generation Communication and …, 2018 - researchgate.net
Cloud computing has become next generation paradigm of Information Technology. The
development of cloud computing has brought several security issues. The prospect users …

Cloud computing security challenges and related defensive measures: A survey and taxonomy

N Chuka-Maduji, V Anu - SN Computer Science, 2021 - Springer
Existing classification systems of cloud computing security challenges have mostly excluded
human error as a major root cause of cloud security issues. Therefore, we propose a new …