[HTML][HTML] A systematic literature review of data governance and cloud data governance

M Al-Ruithe, E Benkhelifa, K Hameed - Personal and Ubiquitous …, 2019 - Springer
Data management solutions on their own are becoming very expensive and not able to cope
with the reality of everlasting data complexity. Businesses have grown more sophisticated in …

Cyber risk assessment in cloud provider environments: Current models and future needs

O Akinrolabu, JRC Nurse, A Martin, S New - Computers & Security, 2019 - Elsevier
Traditional frameworks for risk assessment do not work well for cloud computing. While
recent work has often focussed on the risks faced by firms adopting or selecting cloud …

Security and privacy of sensitive data in cloud computing: a survey of recent developments

A Gholami, E Laure - arXiv preprint arXiv:1601.01498, 2016 - arxiv.org
Cloud computing is revolutionizing many ecosystems by providing organizations with
computing resources featuring easy deployment, connectivity, configuration, automation and …

Immune system for the internet of things using edge technologies

R Roman, R Rios, JA Onieva… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) and edge computing are starting to go hand in hand. By
providing cloud services close to end-users, edge paradigms enhance the functionality of …

Efficient data transfer protocols for big data

B Tierney, E Kissel, M Swany… - 2012 IEEE 8th …, 2012 - ieeexplore.ieee.org
Data set sizes are growing exponentially, so it is important to use data movement protocols
that are the most efficient available. Most data movement tools today rely on TCP over …

A-PPL: an accountability policy language

M Azraoui, K Elkhiyaoui, M Önen, K Bernsmed… - … Workshop on Data …, 2014 - Springer
Cloud Computing raises various security and privacy challenges due to the customers'
inherent lack of control over their outsourced data. One approach to encourage customers to …

Modelling trust and risk for cloud services

E Cayirci, AS De Oliveira - Journal of Cloud Computing, 2018 - Springer
A joint trust and risk model is introduced for federated cloud services. The model is based on
cloud service providers' performance history. It addresses provider and consumer concerns …

Accountable privacy-preserving mechanism for cloud computing based on identity-based encryption

H Cheng, C Rong, M Qian, W Wang - IEEE Access, 2018 - ieeexplore.ieee.org
Considering the openness and cross-domains of cloud computing, the traditional privacy-
preserving technology cannot be applied in cloud computing efficiently. In this paper …

How can cloud users be supported in deciding on, tracking and controlling how their data are used?

S Fischer-Hübner, J Angulo, T Pulls - … and Technologies: 8th IFIP WG 9.2 …, 2014 - Springer
Transparency is a basic privacy principle and factor of social trust. However, the processing
of personal data along a cloud chain is often rather intransparent to the data subjects …

Enhancing accountability in the cloud

MG Jaatun, S Pearson, F Gittler, R Leenes… - International Journal of …, 2020 - Elsevier
This article focuses on the role of accountability within information management, particularly
in cloud computing contexts. Key to this notion is that an accountable Cloud Provider must …