Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges

I Indu, PMR Anand, V Bhaskar - Engineering science and technology, an …, 2018 - Elsevier
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …

Privacy protection and data security in cloud computing: a survey, challenges, and solutions

PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …

Attribute-based access control for ICN naming scheme

B Li, D Huang, Z Wang, Y Zhu - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Information Centric Networking (ICN) is a new network architecture that aims to overcome
the weakness of existing IPbased networking architecture. Instead of establishing a …

TAFC: Time and attribute factors combined access control for time-sensitive data in public cloud

J Hong, K Xue, Y Xue, W Chen, DSL Wei… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
The new paradigm of outsourcing data to the cloud is a double-edged sword. On the one
hand, it frees data owners from the technical management, and is easier for data owners to …

Attribute-based approaches for secure data sharing in industrial contexts

A Chiquito, U Bodin, O Schelén - IEEE Access, 2023 - ieeexplore.ieee.org
The sharing of data is becoming increasingly important for the process and manufacturing
industries that are using data-driven models and advanced analysis to assess production …

Blockchain for identity management: The implications to personal data protection

WL Sim, HN Chua, M Tahir - 2019 IEEE Conference on …, 2019 - ieeexplore.ieee.org
Identity symbolizes a personal level of an individual and becomes an embodiment of who
we are, and Identity Management in Information Communication Technologies field …

Efficient and secure attribute-based access control with identical sub-policies frequently used in cloud storage

K Xue, N Gai, J Hong, DSL Wei… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Under the assumption of honest-but-curious cloud service provider, various cryptographic
techniques have been used to address the issues of data access control and confidentiality …

Multimedia recommendation and transmission system based on cloud platform

J Yang, H Wang, Z Lv, W Wei, H Song… - Future Generation …, 2017 - Elsevier
This paper presents a movie recommendation system according to scores that the users
provide. In view of the movie evaluation system, the impacts of access control and …

Cloud to cloud data migration using self sovereign identity for 5G and beyond

MG Aruna, MK Hasan, S Islam, KG Mohan, P Sharan… - Cluster computing, 2022 - Springer
The Coronavirus pandemic and the work-from-anywhere has created a shift toward cloud-
based services. The pandemic is causing an explosion in cloud migration, expected that by …