Security and privacy in cloud computing

Z Xiao, Y Xiao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …

A survey on security issues and solutions at different layers of Cloud computing

C Modi, D Patel, B Borisaniya, A Patel… - The journal of …, 2013 - Springer
Cloud computing offers scalable on-demand services to consumers with greater flexibility
and lesser infrastructure investment. Since Cloud services are delivered using classical …

Security threats in cloud computing

FB Shaikh, S Haider - 2011 International conference for Internet …, 2011 - ieeexplore.ieee.org
Cloud computing is set of resources and services offered through the Internet. Cloud
services are delivered from data centers located throughout the world. Cloud computing …

Cloud storage security risks, practices and measures: A review

A Syed, K Purushotham… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
The world has seen a quick transition from hard devices for local storage to massive virtual
data centers, all possible because of cloud storage technology. This has brought about the …

A privacy preserving authorisation system for the cloud

DW Chadwick, K Fatema - Journal of Computer and System Sciences, 2012 - Elsevier
In this paper we describe a policy based authorisation infrastructure that a cloud provider
can run as an infrastructure service for its users. It will protect the privacy of usersʼ data by …

Fast detection of transformed data leaks

X Shu, J Zhang, DD Yao, W Feng - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
The leak of sensitive data on computer systems poses a serious threat to organizational
security. Statistics show that the lack of proper encryption on files and communications due …

A secure data sharing and query processing framework via federation of cloud computing

BK Samanthula, Y Elmehdwi, G Howser, S Madria - Information Systems, 2015 - Elsevier
Due to cost-efficiency and less hands-on management, data owners are outsourcing their
data to the cloud which can provide access to the data as a service. However, by …

Privacy protection for data-driven smart manufacturing systems

KS Wong, MH Kim - International Journal of Web Services Research …, 2017 - igi-global.com
Abstract The Industrial Internet of Things (IIoT) is a new industrial ecosystem that combines
intelligent and autonomous machines, advanced predictive analytics, and machine-human …

Towards end-to-end secure content storage and delivery with public cloud

H Xiong, X Zhang, D Yao, X Wu, Y Wen - Proceedings of the second …, 2012 - dl.acm.org
Recent years have witnessed the trend of leveraging cloud-based services for large scale
content storage, processing, and distribution. Security and privacy are among top concerns …

Methods, apparatus and systems for monitoring locations of data within a network service

M Brandt, S Pearson, S Singhal - US Patent 9,166,893, 2015 - Google Patents
BACKGROUND On-demand, elastic, and/or dynamic network services can provide flexible
data processing and/or data storage. Such services allow users to access computing and/or …