Filters








203 Hits in 6.2 sec

Data Privacy Protection Mechanisms in Cloud

Niharika Singh, Ashutosh Kumar Singh
2017 Data Science and Engineering  
In the cloud computing environment, the privacy of the electronic data is a serious issue that requires special considerations.  ...  We have presented a state-of-the-art review of the methodologies and approaches that are currently being used to cope with the significant issue of privacy.  ...  Public cloud This entity is responsible for a data outsourcing service. It assists in controlling the access from outside users to the stored data.  ... 
doi:10.1007/s41019-017-0046-0 fatcat:cb2ok5d5jbdltffawp6hvz4j6e

Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption

Al-Dahhan, Shi, Lee, Kifayat
2019 Sensors  
the revocation, and comparisons among themaccording to a number of secure cloud storage criteria.  ...  In particular, Ciphertext‐Policy Attribute‐Based Encryption (CP‐ABE) is a promising,advanced type of encryption technique that resolves an open challenge to regulate fine‐grainedaccess control of sensitive  ...  Acknowledgments: The authors gratefully acknowledge support from the Republic of Iraq, the Iraqi Higher Education Ministry, Iraqi Cultural Attaché in London, and University of Anbar in Iraq.  ... 
doi:10.3390/s19071695 fatcat:ebu4reenvbcsflttzyr26o2jw4

Blockchain for 5G and Beyond Networks: A State of the Art Survey [article]

Dinh C Nguyen, Pubudu N Pathirana, Ming Ding, Aruna Seneviratne
2019 arXiv   pre-print
In this paper, we provide a state-of-art survey on the integration of blockchain with 5G networks and beyond.  ...  and enhanced system throughput.  ...  , flexibility and scalability. • Security: In SDN, security is about the authentication in the control plane and mitigation of data modification and leakage in the data plan.  ... 
arXiv:1912.05062v1 fatcat:ecitoeu5ijh6flblgm74fpvmz4

Architecture For Data Management

Marko Vukolic
2015 Zenodo  
In this document we present the preliminary architecture of the SUPERCLOUD data management and storage.  ...  We survey security and dependability technologies and discuss designs for the overall unifying architecture for data management that serves as an umbrella for different security and dependability data  ...  Data availability: 99.99%. Security requirements: Storage security: Storage must be robust against any security breaches covering disk, file system and database layers.  ... 
doi:10.5281/zenodo.49788 fatcat:5oup2d7sk5dm7efj77pjvg2bru

A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet of Things [article]

Abdulmalik Alwarafy, Khaled A. Al-Thelaya, Mohamed Abdallah
2020 arXiv   pre-print
This paper conducts a comprehensive survey on security and privacy issues in the context of EC-assisted IoT.  ...  Although this paradigm provides unique features and enhanced quality of service (QoS), it also introduces huge risks in data security and privacy aspects.  ...  In [28] , the authors propose a security layered mechanism for decentralized edge data storage. They established their solution for multi-factor access control.  ... 
arXiv:2008.03252v1 fatcat:cwrrmcscandddok5pvry4dx23a

Security Challenges from Abuse of Cloud Service Threat

Ishrat Ahmad, et al.
2019 International Journal of Computing and Digital Systems  
In spite of countless benefits that cloud service has to offer, there is always a security concern for new threats and risks.  ...  The study has evaluated the current available solutions and proposed mitigating security controls for the security risks and challenges from Abuse of cloud services threat.  ...  outsourcing, the service providers must assure customers secured computing and data storage [29] .  ... 
doi:10.12785/ijcds/080103 fatcat:zlkr7f7owve3jnydbozyt7fyly

Towards the Uses of Blockchain in Mobile Health Services and Applications: A Survey [article]

João Amaral Santos, Pedro R. M. Inácio, Bruno M. Silva
2019 arXiv   pre-print
However, new studies have shown that this technology can be a powerful tool in empowering patients to control their own health data, as well for enabling a fool-proof health data history and establishing  ...  Hence, this paper presents a review of the current security best practices for m-Health including blockchain technologies in healthcare.  ...  Acknowledgments Contributing to this work, the authors affiliated with the Instituto de Telecomunicações also acknowledge the funding for this research: the FCT/MEC through national funds and when applicable  ... 
arXiv:1909.11013v2 fatcat:3rop4z3h6zeabk6evthergpa2i

A Survey of the State of Cloud Security

Sanjay P. Ahuja, Deepa Komathukattil
2012 Network and Communication Technologies  
The multitenant nature of the cloud and the fact that data is stored in multiple locations compound these security concerns.  ...  Guarantees of secure data and transactions from the service provider will enable more users to migrate to a cloud environment.  ...  Acknowledgement This research has been supported by the Fidelity National Financial Distinguished Professorship in Computer and Information Sciences.  ... 
doi:10.5539/nct.v1n2p66 fatcat:k7zrcg3ukza6bin6p6tgoxwixq

A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective

Hezam Akram Abdulghani, Niels Alexander Nijdam, Anastasija Collen, Dimitri Konstantas
2019 Symmetry  
Protecting IoT data of such applications at rest either on the objects or in the cloud is an indispensable requirement for achieving a symmetry in the handling and protection of the IoT, as we do with  ...  Fourth, we propose a framework of security and privacy guidelines for IoT data at rest that can be utilised to enhance IoT security and privacy by design and establish a symmetry with the protection of  ...  Proposes a technique in which IoT data can be stored securely using cryptographic algorithms and several access control policies. [51] 2018 Proposes a flexible framework to address storing IoT data securely  ... 
doi:10.3390/sym11060774 fatcat:ym5b6kycxvhenpwb7q5hpzihby

Data exfiltration: A review of external attack vectors and countermeasures

Faheem Ullah, Matthew Edwards, Rajiv Ramdhany, Ruzanna Chitchyan, M. Ali Babar, Awais Rashid
2018 Journal of Network and Computer Applications  
on protecting data in 'in use' state, therefore, future research needs to be directed towards securing data in 'in rest' and 'in transit' states (e) There is no standard or framework for evaluation of  ...  With the growing interest in data exfiltration, it is important to review data exfiltration attack vectors and countermeasures to support future research in this field.  ...  Intelligent and planned outsourcing of data to several clouds seems a good idea for reducing the risk of data leakage in cloud environments, however, organizations may be reluctant in adopting such an  ... 
doi:10.1016/j.jnca.2017.10.016 fatcat:fweg67tparct5owb3r4qrpgvxq

A New Access Control Scheme for Protecting Distributed Cloud Services and Resources

Syed Rizvi, John Mitchell
2016 Services Transactions on Cloud Computing  
In this paper, we present a novel generic access control scheme, capable to work with most of the available access control policies using a global resource management system (GRMS) to effectively handle  ...  Among all security challenges, access control is of vital importance, since it provides security mechanisms to protect customer's data, cloud services, applications, resources against unauthorized access  ...  to secure a cloud computing system.  ... 
doi:10.29268/stcc.2016.0009 fatcat:iepyeyai5zeihpwdx2t3bt5zna

A New Access Control Scheme for Protecting Distributed Cloud Services and Resources

2016 Services Transactions on Cloud Computing  
In this paper, we present a novel generic access control scheme, capable to work with most of the available access control policies using a global resource management system (GRMS) to effectively handle  ...  Among all security challenges, access control is of vital importance, since it provides security mechanisms to protect customer's data, cloud services, applications, resources against unauthorized access  ...  to secure a cloud computing system.  ... 
doi:10.29268/stcc.2016.4.3.3 fatcat:n5fum7zxpza5jck5zvsqqrohl4

Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture

Dr. Sai Manoj Kudavaralli
2021 Zenodo  
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture: D.Sc. Thesis  ...  An encryption scheme for a two-tier system presented to achieve flexible and fine-grained access control in the cloud.  ...  A Study on Data Controller-Preserving Public Auditing for Secure Cloud Storage, Dr. K.  ... 
doi:10.5281/zenodo.5148421 fatcat:lzanqvxdlre2dh3hdhjxibdrim

The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey

Noshina Tariq, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir
2019 Sensors  
In addition, a comprehensive review of security requirements in fog-enabled IoT systems is presented.  ...  In this context, this work formalizes the task of securing big data and its scope, provides a taxonomy to categories threats to fog-based IoT systems, presents a comprehensive comparison of state-of-the-art  ...  IoT systems can be established by connecting sensors with a distributed data transmission system for remote access, processing and storage.  ... 
doi:10.3390/s19081788 fatcat:iazdjbrwwfdwxfrpkwpzjf4i3m

P2 KASE A2 - Privacy Preserving Key Aggregate Searchable Encryption supporting Authentication and Access Control on Multi-Delegation

Mukti Padhya, DEVESH JINWALA
2020 IET Information Security  
Therefore, the data owners (DOs) outsource their data or computational operations to the cloud service providers.  ...  The proposed scheme provides security against the impersonation attack by verifying the user's authentication.  ...  Therefore, the confidentiality of data along with the authentication of the user is required in a practical data sharing system based on cloud storage.  ... 
doi:10.1049/iet-ifs.2020.0070 fatcat:upgucuexqvaujosyymqwghlszq
« Previous Showing results 1 — 15 out of 203 results