Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

[PDF][PDF] Strategic Survey on Security and Privacy Methods of Cloud Computing Environment

SS Vellela, R Balamanigandan… - Journal of Next …, 2022 - jnxtgentech.com
This analysis implements a strategic review on cloud computing environment confidentiality
and privacy approaches. In an IT sector, the recently discovering phenomenal technology is …

A blockchain-based multi-cloud storage data auditing scheme to locate faults

C Zhang, Y Xu, Y Hu, J Wu, J Ren… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Network storage services have benefited countless users worldwide due to the notable
features of convenience, economy and high availability. Since a single service provider is …

A blockchain-enabled deduplicatable data auditing mechanism for network storage services

Y Xu, C Zhang, G Wang, Z Qin… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Since network storage services achieve widespread adoption, security and performance
issues are becoming primary concerns, affecting the scalability of storage systems …

Auditing cache data integrity in the edge computing environment

B Li, Q He, F Chen, H Jin, Y Xiang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Edge computing allows app vendors to deploy their applications and relevant data on
distributed edge servers to serve nearby users. Caching data on edge servers can minimize …

An efficient and secure dynamic auditing protocol for data storage in cloud computing

K Yang, X Jia - IEEE transactions on parallel and distributed …, 2012 - ieeexplore.ieee.org
In cloud computing, data owners host their data on cloud servers and users (data
consumers) can access the data from cloud servers. Due to the data outsourcing, however …

Dynamic-hash-table based public auditing for secure cloud storage

H Tian, Y Chen, CC Chang, H Jiang… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Cloud storage is an increasingly popular application of cloud computing, which can provide
on-demand outsourcing data services for both organizations and individuals. However …

Identity-based distributed provable data possession in multicloud storage

H Wang - IEEE Transactions on Services Computing, 2014 - ieeexplore.ieee.org
Remote data integrity checking is of crucial importance in cloud storage. It can make the
clients verify whether their outsourced data is kept intact without downloading the whole …

Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms

N Kaaniche, M Laurent - Computer Communications, 2017 - Elsevier
Recent technological advances have sparked the popularity and success of cloud. This new
paradigm is gaining an expanding interest, since it provides cost efficient architectures that …