A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues

M Stoyanova, Y Nikoloudakis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Today is the era of the Internet of Things (IoT). The recent advances in hardware and
information technology have accelerated the deployment of billions of interconnected, smart …

A survey of security in cloud, edge, and fog computing

A Ometov, OL Molua, M Komarov, J Nurmi - Sensors, 2022 - mdpi.com
The field of information security and privacy is currently attracting a lot of research interest.
Simultaneously, different computing paradigms from Cloud computing to Edge computing …

A review of security standards and frameworks for IoT-based smart environments

NM Karie, NM Sahri, W Yang, C Valli… - IEEE Access, 2021 - ieeexplore.ieee.org
Assessing the security of IoT-based smart environments such as smart homes and smart
cities is becoming fundamentally essential to implementing the correct control measures and …

Security and privacy in cloud computing: technical review

YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …

[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

OI Abiodun, M Alawida, AE Omolara… - Journal of King Saud …, 2022 - Elsevier
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …

IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques

S Balogh, O Gallo, R Ploszek, P Špaček, P Zajac - Electronics, 2021 - mdpi.com
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT
devices are especially damaging and need to be addressed. In this treatise, we overview …

Threats and corrective measures for IoT security with observance of cybercrime: A survey

S Rani, A Kataria, V Sharma, S Ghosh… - Wireless …, 2021 - Wiley Online Library
Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality
and comfort. IoT has contributed significantly to numerous application areas. The stormy …

Blockchain on security and forensics management in edge computing for IoT: A comprehensive survey

Z Liao, X Pang, J Zhang, B Xiong… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Security and forensics represent two key components for network management, especially
to guarantee the trusted operation of massive access networks such as the Internet of Things …

A Comprehensive Investigation of Privacy Concerns in the Context of Cloud Computing Using Self-Service Paradigms

VV Vegesna - International Journal of Management, Technology …, 2023 - papers.ssrn.com
According to a Forbes' report published in 2015, cloud-based security spending is expected
to increase by 42%. According to another research, the IT security expenditure had …

A confusion method for the protection of user topic privacy in Chinese keyword-based book retrieval

Z Wu, J Xie, S Shen, C Lin, G Xu, E Chen - ACM transactions on asian …, 2023 - dl.acm.org
In this article, aiming at a Chinese keyword-based book search service, from a technological
perspective, we propose to modify a user query sequence carefully to confuse the user …