Privacy preservation models for third-party auditor over cloud computing: A survey

A Razaque, MBH Frej, B Alotaibi, M Alotaibi - Electronics, 2021 - mdpi.com
Cloud computing has become a prominent technology due to its important utility service; this
service concentrates on outsourcing data to organizations and individual consumers. Cloud …

A Review on IoTs Applications and Security Threats via Data Transfer over Networks

BM Radhi, MA Hussain, ZA Abduljabbar… - Computer Science On …, 2024 - Springer
The concept of the “Internet of Things,” which states that everything is connected to
everything else and that everything interacts with everything else, is a fascinating …

Comprehensive Challenges to E-government in Iraq

HK Abdali, MA Hussain, ZA Abduljabbar… - Computer Science On …, 2024 - Springer
In recent years, governments and commercial organizations all over the world have
endeavored to explore new searches, opportunities, and investments for making their …

Decentralized data privacy protection and cloud auditing security management

M Mageshwari, R Naresh - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Decentralized data protection is becoming more important as more firms employ Cloud
resources. Securing, protecting, and processing user data are primary issues that Cloud …

Light-weight accountable privacy preserving (LAPP) protocol to determine dishonest role of third party auditor in cloud auditing

MBH Frej, J Dichter, N Gupta - 2018 ieee international …, 2018 - ieeexplore.ieee.org
Cloud computing is surfacing as the next disruptive utility paradigm. It provides massive
storage capabilities, the development environment for application developers through virtual …

Smart Grid and Renewable Energy Security Challenges: A Review

ZA Ali, ZA Abduljabbar, HAA AL-Asadi… - Computer Science On …, 2024 - Springer
Today, with the diversity of electric power sources and the huge size of electrical power
networks, and because of the harmful waste from non-renewable energy sources, the trend …

Lightweight Accountable Privacy-Preserving Protocol Allowing the Cloud Client to Audit the Third-Party Auditor for Malicious Activities

M Ben Haj Frej, J Dichter, N Gupta - Applied Sciences, 2019 - mdpi.com
Featured Application The potential application of this work is in the field of cloud computing
based on a third-party auditor. The idea is to provide the cloud client with tools that allow him …

An efficient architecture to ensure data integrity in ERP systems

K Parthiban, RV Nataraj - 2019 5th International Conference on …, 2019 - ieeexplore.ieee.org
In digital era, Cloud based web solutions plays a vital role in private sectors as well as the
government sectors namely CSR (Common Service Centers), UIDAI etc., spreads widely …

Detecting and Mitigating Malicious TPAs in Cloud-Based Data Storage Through Public Auditing

PA Balaram, B Jyoti, D Kashmira - 2024 Global Conference on …, 2024 - ieeexplore.ieee.org
The concept of data auditing has been developed due to the increasing concern about the
safety of data stored in the cloud which can be attacked externally or modified without …

[PDF][PDF] An Efficient and Secure Scheme for Dynamic Shared Data in Cloud.

ZA Hussien, ZA Abduljabbar, MA Hussain… - CSAE, 2019 - researchgate.net
People have proposed many data integrity techniques to secure data storage in cloud. The
majority of these schemes assume that only the owner of the data can modify their storage in …