A systematic literature review on cloud computing security: threats and mitigation strategies

B Alouffi, M Hasnain, A Alharbi, W Alosaimi… - Ieee …, 2021 - ieeexplore.ieee.org
Cloud computing has become a widely exploited research area in academia and industry.
Cloud computing benefits both cloud services providers (CSPs) and consumers. The …

Fog computing security: a review of current applications and security solutions

S Khan, S Parkinson, Y Qin - Journal of Cloud Computing, 2017 - Springer
Fog computing is a new paradigm that extends the Cloud platform model by providing
computing resources on the edges of a network. It can be described as a cloud-like platform …

[HTML][HTML] Artificial intelligence and cloud-based Collaborative Platforms for Managing Disaster, extreme weather and emergency operations

S Gupta, S Modgil, A Kumar, U Sivarajah… - International Journal of …, 2022 - Elsevier
Natural disasters are often unpredictable and therefore there is a need for quick and
effective response to save lives and infrastructure. Hence, this study is aimed at achieving …

[PDF][PDF] Data security, privacy, availability and integrity in cloud computing: issues and current solutions

S Aldossary, W Allen - International Journal of Advanced …, 2016 - pdfs.semanticscholar.org
Cloud computing changed the world around us. Now people are moving their data to the
cloud since data is getting bigger and needs to be accessible from many devices. Therefore …

Cloud security: Emerging threats and current solutions

L Coppolino, S D'Antonio, G Mazzeo… - Computers & Electrical …, 2017 - Elsevier
Many organizations are stuck in the cloudify or not to cloudify limbo, mainly due to concerns
related to the security of enterprise sensitive data. Removing this barrier is a key pre …

Feasibility of fog computing

B Varghese, N Wang, DS Nikolopoulos… - Handbook of Integration of …, 2020 - Springer
As billions of devices get connected to the Internet, it will not be sustainable to use the cloud
as a centralised server. The way forward is to decentralise computations away from the …

BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem

K Awuson-David, T Al-Hadhrami, M Alazab… - Future Generation …, 2021 - Elsevier
Log files are the primary source of recording users, applications and protocols, activities in
the cloud ecosystem. Cloud forensic investigators can use log evidence to ascertain when …

Enforcing security in Internet of Things frameworks: A systematic literature review

M Aly, F Khomh, M Haoues, A Quintero, S Yacout - Internet of Things, 2019 - Elsevier
With the rise of the Internet of Things (IoT) technology, the number of IoT devices/sensors
has increased significantly. It is anticipated that large-scale sensor-based systems will …

Scalability analysis comparisons of cloud-based software services

A Al-Said Ahmad, P Andras - Journal of Cloud Computing, 2019 - Springer
Performance and scalability testing and measurements of cloud-based software services are
necessary for future optimizations and growth of cloud computing. Scalability, elasticity, and …

Cloud log forensics: Foundations, state of the art, and future directions

S Khan, A Gani, AWA Wahab, MA Bagiwa… - ACM Computing …, 2016 - dl.acm.org
Cloud log forensics (CLF) mitigates the investigation process by identifying the malicious
behavior of attackers through profound cloud log analysis. However, the accessibility …