On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Security and privacy challenges in mobile cloud computing: Survey and way ahead

MB Mollah, MAK Azad, A Vasilakos - Journal of Network and Computer …, 2017 - Elsevier
The rapid growth of mobile computing is seriously challenged by the resource constrained
mobile devices. However, the growth of mobile computing can be enhanced by integrating …

An efficient public auditing protocol with novel dynamic structure for cloud data

J Shen, J Shen, X Chen, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With the rapid development of cloud computing, cloud storage has been accepted by an
increasing number of organizations and individuals, therein serving as a convenient and on …

Auditing cache data integrity in the edge computing environment

B Li, Q He, F Chen, H Jin, Y Xiang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Edge computing allows app vendors to deploy their applications and relevant data on
distributed edge servers to serve nearby users. Caching data on edge servers can minimize …

Secure real-time traffic data aggregation with batch verification for vehicular cloud in VANETs

J Shen, D Liu, X Chen, J Li, N Kumar… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
The vehicular cloud provides many significant advantages to Vehicular ad-hoc Networks
(VANETs), such as unlimited storage space, powerful computing capability and timely traffic …

Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage

A Yang, J Xu, J Weng, J Zhou… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cloud storage has been in widespread use nowadays, which alleviates users' burden of
local data storage. Meanwhile, how to ensure the security and integrity of the outsourced …

Dredas: Decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial IoT

K Fan, Z Bao, M Liu, AV Vasilakos, W Shi - Future Generation Computer …, 2020 - Elsevier
The development of cloud computing and the Internet of things (IOT) attracts more and more
enterprises to outsource the data from their Industrial Internet of things (IIOT) to cloud servers …

Privacy-preserving public auditing for secure data storage in fog-to-cloud computing

H Tian, F Nan, CC Chang, Y Huang, J Lu… - Journal of Network and …, 2019 - Elsevier
With increasing popularity of fog-to-cloud based Internet of Things (IoT), how to ensure the
integrity of IoT data outsourced in clouds has become one of the biggest security challenges …

A collaborative auditing blockchain for trustworthy data integrity in cloud storage system

P Huang, K Fan, H Yang, K Zhang, H Li, Y Yang - IEEE Access, 2020 - ieeexplore.ieee.org
Cloud storage system provides data owners with remote storage service, which allows them
to outsource data without local storage burden. Nevertheless, the cloud storage service is …

[HTML][HTML] Public auditing scheme for integrity verification in distributed cloud storage system

K Mahalakshmi, K Kousalya, H Shekhar… - Scientific …, 2021 - hindawi.com
Cloud storage provides a potential solution replacing physical disk drives in terms of
prominent outsourcing services. A threaten from an untrusted server affects the security and …