Fog computing security: a review of current applications and security solutions

S Khan, S Parkinson, Y Qin - Journal of Cloud Computing, 2017 - Springer
Fog computing is a new paradigm that extends the Cloud platform model by providing
computing resources on the edges of a network. It can be described as a cloud-like platform …

Centralized fog computing security platform for IoT and cloud in healthcare system

C Thota, R Sundarasekar, G Manogaran… - … in research and …, 2018 - igi-global.com
This chapter proposes an efficient centralized secure architecture for end to end integration
of IoT based healthcare system deployed in Cloud environment. The proposed platform …

Advancements in social data security and encryption: A review

YS Sangwan, S Lal, P Bhambri, A Kumar… - NVEO-Natural Volatiles & …, 2021 - nveo.org
These days message application administrations are in extraordinary interest, as they
offered start to finish encryption (E2EE) that is fundamental to give security to the clients …

PbDinEHR: A novel privacy by design developed framework using distributed data storage and sharing for secure and scalable electronic health records management

FH Semantha, S Azam, B Shanmugam… - Journal of Sensor and …, 2023 - mdpi.com
Privacy in Electronic Health Records (EHR) has become a significant concern in today's
rapidly changing world, particularly for personal and sensitive user data. The sheer volume …

Database security threats and challenges

A Mousa, M Karabatak, T Mustafa - 2020 8th International …, 2020 - ieeexplore.ieee.org
With the growth and increasing sophistication of the Internet and the increasing
dependence, it appeared more and more services over the Internet-based database, so it …

Big data security framework for distributed cloud data centers

C Thota, G Manogaran, D Lopez… - Cyber Security and …, 2018 - igi-global.com
The rapid development of data generation sources such as digital sensors, networks, and
smart devices along with their extensive use is leading to create huge database and coins …

Security analysis of unstructured data in NOSQL MongoDB database

J Kumar, V Garg - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
NoSQL databases systems are non-relational databases uniquely intended to give high
accessibility, reliability, and scalability for enormous data. Additionally sharding is the main …

[PDF][PDF] Review of attacks on databases and database security techniques

S Kulkarni, S Urolagin - International Journal of Emerging Technology and …, 2012 - Citeseer
Data is most important in today's world as it helps organizations as well as individuals to
extract information and use it to make various decisions. Data are generally stored in …

Implementing a database encryption solution, design and implementation issues

E Shmueli, R Vaisenberg, E Gudes, Y Elovici - Computers & security, 2014 - Elsevier
In this paper, we analyze and compare five traditional architectures for database encryption.
We show that existing architectures may provide a high level of security, but have a …

Effects of virtualization on information security

SH Li, DC Yen, SC Chen, PS Chen, WH Lu… - Computer Standards & …, 2015 - Elsevier
Virtualization provides the essential assistance to save energy & resources and also simplify
the required information management. However, the information security issues have …