Security and privacy in cloud computing

Z Xiao, Y Xiao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …

Data security and privacy in cloud computing

Y Sun, J Zhang, Y Xiong, G Zhu - International Journal of …, 2014 - journals.sagepub.com
Data security has consistently been a major issue in information technology. In the cloud
computing environment, it becomes particularly serious because the data is located in …

A Highly Efficient and Secure Procedure for Protecting Privacy in Cloud Data Storage Environments

VV Vegesna - International Journal of Management, Technology …, 2023 - papers.ssrn.com
Outsourcing data into the cloud becomes popular thanks to the pay-as-you-go paradigm.
However, such practice raises privacy concerns. The conventional way to achieve data …

Mapping the expansion of Google's serving infrastructure

M Calder, X Fan, Z Hu, E Katz-Bassett… - Proceedings of the …, 2013 - dl.acm.org
Modern content-distribution networks both provide bulk content and act as" serving
infrastructure" for web services in order to reduce user-perceived latency. Serving …

Swarm Differential Privacy for Purpose‐Driven Data‐Information‐Knowledge‐Wisdom Architecture

Y Li, Y Duan, Z Maamar, H Che… - Mobile Information …, 2021 - Wiley Online Library
Privacy protection has recently been in the spotlight of attention to both academia and
industry. Society protects individual data privacy through complex legal frameworks. The …

Modeling data, information and knowledge for security protection of hybrid IoT and edge resources

Y Duan, X Sun, H Che, C Cao, Z Li, X Yang - Ieee Access, 2019 - ieeexplore.ieee.org
Currently, with the growth of the Internet of Things devices and the emergence of massive
edge resources, security protection content has not only empowered IoT devices with the …

Data privacy protection for edge computing of smart city in a DIKW architecture

Y Duan, Z Lu, Z Zhou, X Sun, J Wu - Engineering Applications of Artificial …, 2019 - Elsevier
Current trend of shifting computing from centralized Cloud to Edge has not only empowered
huge amount of IoT devices with the capability of the accumulation of individualized …

The state of public infrastructure-as-a-service cloud security

W Huang, A Ganjali, BH Kim, S Oh, D Lie - ACM Computing Surveys …, 2015 - dl.acm.org
The public Infrastructure-as-a-Service (IaaS) cloud industry has reached a critical mass in
the past few years, with many cloud service providers fielding competing services. Despite …

Cryptographic solutions for cloud storage: Challenges and research opportunities

L Zhang, H Xiong, Q Huang, J Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
While cloud computing is relatively mature and its potential benefits well understood by
individual, industry and government consumers, a number of security and privacy concerns …

Geolocation of data in the cloud

M Gondree, ZNJ Peterson - Proceedings of the third ACM conference on …, 2013 - dl.acm.org
We introduce and analyze a general framework for authentically binding data to a location
while providing strong assurances against cloud storage providers that (either accidentally …