Mobile cloud computing models security issues: A systematic review

AS AlAhmad, H Kahtan, YI Alzoubi, O Ali… - Journal of Network and …, 2021 - Elsevier
Mobile cloud computing (MCC) is a trending technology employed in several domains to
overcome the limitations of mobile devices by using cloud capabilities. Communication …

A systematic literature review for authorization and access control: definitions, strategies and models

AKYS Mohamed, D Auer, D Hofer… - International journal of web …, 2022 - emerald.com
Purpose Authorization and access control have been a topic of research for several
decades. However, existing definitions are inconsistent and even contradicting each other …

Towards DNA based data security in the cloud computing environment

S Namasudra, D Devi, S Kadry, R Sundarasekar… - Computer …, 2020 - Elsevier
Nowadays, data size is increasing day by day from gigabytes to terabytes or even petabytes,
mainly because of the evolution of a large amount of real-time data. Most of the big data is …

Fast and secure data accessing by using DNA computing for the cloud environment

S Namasudra - IEEE Transactions on Services Computing, 2020 - ieeexplore.ieee.org
In a cloud environment, traditional approaches are used to encrypt any data by using 0 and
1 that increase data security issues because of the presence of numerous malicious users …

Data access control in the cloud computing environment for bioinformatics

S Namasudra - Research Anthology on Bioinformatics, Genomics …, 2024 - igi-global.com
Bioinformatics is a branch of science that applies computational science in the biological
world. In bioinformatics, large sizes of biological data (genome) are processed in the cloud …

Privacy preserving E-voting cloud system based on ID based encryption

A Shankar, P Pandiaraja, K Sumathi, T Stephan… - Peer-to-Peer Networking …, 2021 - Springer
Most of the various sectors in today's life such as bank, transport, voting, health, electricity,
etc., are currently digitalized. In our research paper, we have surveyed the voting system …

FAST: Fast accessing scheme for data transmission in cloud computing

S Namasudra, R Chakraborty, S Kadry… - Peer-to-Peer Networking …, 2021 - Springer
With the rapid advancement of emerging technologies, a huge amount of data is created
and processed in daily life. Nowadays, Cloud Computing (CC) technology is one of the …

Multiuser physical layer authentication in Internet of Things with data augmentation

RF Liao, H Wen, S Chen, F Xie, F Pan… - IEEE internet of …, 2019 - ieeexplore.ieee.org
Unlike most of the upper layer authentication mechanisms, the physical (PHY) layer
authentication takes advantages of channel impulse response from wireless propagation to …

MADDPG-based security situational awareness for smart grid with intelligent edge

W Lei, H Wen, J Wu, W Hou - Applied Sciences, 2021 - mdpi.com
Advanced communication and information technologies enable smart grids to be more
intelligent and automated, although many security issues are emerging. Security situational …

DNA computing and table based data accessing in the cloud environment

S Namasudra, S Sharma, GC Deka, P Lorenz - Journal of Network and …, 2020 - Elsevier
The attractive benefits of cloud computing environment motivate Information Technology (IT)
companies to move their IT infrastructure on the cloud server. In a cloud environment …