A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Data Privacy Protection Mechanisms in Cloud
2017
Data Science and Engineering
In the cloud computing environment, the privacy of the electronic data is a serious issue that requires special considerations. ...
We have presented a state-of-the-art review of the methodologies and approaches that are currently being used to cope with the significant issue of privacy. ...
Public cloud This entity is responsible for a data outsourcing service. It assists in controlling the access from outside users to the stored data. ...
doi:10.1007/s41019-017-0046-0
fatcat:cb2ok5d5jbdltffawp6hvz4j6e
Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
2019
Sensors
the revocation, and comparisons among themaccording to a number of secure cloud storage criteria. ...
In particular, Ciphertext‐Policy Attribute‐Based Encryption (CP‐ABE) is a promising,advanced type of encryption technique that resolves an open challenge to regulate fine‐grainedaccess control of sensitive ...
Acknowledgments: The authors gratefully acknowledge support from the Republic of Iraq, the Iraqi Higher Education Ministry, Iraqi Cultural Attaché in London, and University of Anbar in Iraq. ...
doi:10.3390/s19071695
fatcat:ebu4reenvbcsflttzyr26o2jw4
Blockchain for 5G and Beyond Networks: A State of the Art Survey
[article]
2019
arXiv
pre-print
In this paper, we provide a state-of-art survey on the integration of blockchain with 5G networks and beyond. ...
and enhanced system throughput. ...
, flexibility and scalability. • Security: In SDN, security is about the authentication in the control plane and mitigation of data modification and leakage in the data plan. ...
arXiv:1912.05062v1
fatcat:ecitoeu5ijh6flblgm74fpvmz4
Architecture For Data Management
2015
Zenodo
In this document we present the preliminary architecture of the SUPERCLOUD data management and storage. ...
We survey security and dependability technologies and discuss designs for the overall unifying architecture for data management that serves as an umbrella for different security and dependability data ...
Data availability: 99.99%.
Security requirements: Storage security: Storage must be robust against any security breaches covering disk, file system and database layers. ...
doi:10.5281/zenodo.49788
fatcat:5oup2d7sk5dm7efj77pjvg2bru
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet of Things
[article]
2020
arXiv
pre-print
This paper conducts a comprehensive survey on security and privacy issues in the context of EC-assisted IoT. ...
Although this paradigm provides unique features and enhanced quality of service (QoS), it also introduces huge risks in data security and privacy aspects. ...
In [28] , the authors propose a security layered mechanism for decentralized edge data storage. They established their solution for multi-factor access control. ...
arXiv:2008.03252v1
fatcat:cwrrmcscandddok5pvry4dx23a
Security Challenges from Abuse of Cloud Service Threat
2019
International Journal of Computing and Digital Systems
In spite of countless benefits that cloud service has to offer, there is always a security concern for new threats and risks. ...
The study has evaluated the current available solutions and proposed mitigating security controls for the security risks and challenges from Abuse of cloud services threat. ...
outsourcing, the service providers must assure customers secured computing and data storage [29] . ...
doi:10.12785/ijcds/080103
fatcat:zlkr7f7owve3jnydbozyt7fyly
Towards the Uses of Blockchain in Mobile Health Services and Applications: A Survey
[article]
2019
arXiv
pre-print
However, new studies have shown that this technology can be a powerful tool in empowering patients to control their own health data, as well for enabling a fool-proof health data history and establishing ...
Hence, this paper presents a review of the current security best practices for m-Health including blockchain technologies in healthcare. ...
Acknowledgments Contributing to this work, the authors affiliated with the Instituto de Telecomunicações also acknowledge the funding for this research: the FCT/MEC through national funds and when applicable ...
arXiv:1909.11013v2
fatcat:3rop4z3h6zeabk6evthergpa2i
A Survey of the State of Cloud Security
2012
Network and Communication Technologies
The multitenant nature of the cloud and the fact that data is stored in multiple locations compound these security concerns. ...
Guarantees of secure data and transactions from the service provider will enable more users to migrate to a cloud environment. ...
Acknowledgement This research has been supported by the Fidelity National Financial Distinguished Professorship in Computer and Information Sciences. ...
doi:10.5539/nct.v1n2p66
fatcat:k7zrcg3ukza6bin6p6tgoxwixq
A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective
2019
Symmetry
Protecting IoT data of such applications at rest either on the objects or in the cloud is an indispensable requirement for achieving a symmetry in the handling and protection of the IoT, as we do with ...
Fourth, we propose a framework of security and privacy guidelines for IoT data at rest that can be utilised to enhance IoT security and privacy by design and establish a symmetry with the protection of ...
Proposes a technique in which IoT data can be stored securely using cryptographic algorithms and several access control policies. [51] 2018 Proposes a flexible framework to address storing IoT data securely ...
doi:10.3390/sym11060774
fatcat:ym5b6kycxvhenpwb7q5hpzihby
Data exfiltration: A review of external attack vectors and countermeasures
2018
Journal of Network and Computer Applications
on protecting data in 'in use' state, therefore, future research needs to be directed towards securing data in 'in rest' and 'in transit' states (e) There is no standard or framework for evaluation of ...
With the growing interest in data exfiltration, it is important to review data exfiltration attack vectors and countermeasures to support future research in this field. ...
Intelligent and planned outsourcing of data to several clouds seems a good idea for reducing the risk of data leakage in cloud environments, however, organizations may be reluctant in adopting such an ...
doi:10.1016/j.jnca.2017.10.016
fatcat:fweg67tparct5owb3r4qrpgvxq
A New Access Control Scheme for Protecting Distributed Cloud Services and Resources
2016
Services Transactions on Cloud Computing
In this paper, we present a novel generic access control scheme, capable to work with most of the available access control policies using a global resource management system (GRMS) to effectively handle ...
Among all security challenges, access control is of vital importance, since it provides security mechanisms to protect customer's data, cloud services, applications, resources against unauthorized access ...
to secure a cloud computing system. ...
doi:10.29268/stcc.2016.0009
fatcat:iepyeyai5zeihpwdx2t3bt5zna
A New Access Control Scheme for Protecting Distributed Cloud Services and Resources
2016
Services Transactions on Cloud Computing
In this paper, we present a novel generic access control scheme, capable to work with most of the available access control policies using a global resource management system (GRMS) to effectively handle ...
Among all security challenges, access control is of vital importance, since it provides security mechanisms to protect customer's data, cloud services, applications, resources against unauthorized access ...
to secure a cloud computing system. ...
doi:10.29268/stcc.2016.4.3.3
fatcat:n5fum7zxpza5jck5zvsqqrohl4
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture
2021
Zenodo
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture: D.Sc. Thesis ...
An encryption scheme for a two-tier system presented to achieve flexible and fine-grained access control in the cloud. ...
A Study on Data Controller-Preserving Public Auditing for Secure Cloud
Storage, Dr. K. ...
doi:10.5281/zenodo.5148421
fatcat:lzanqvxdlre2dh3hdhjxibdrim
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
2019
Sensors
In addition, a comprehensive review of security requirements in fog-enabled IoT systems is presented. ...
In this context, this work formalizes the task of securing big data and its scope, provides a taxonomy to categories threats to fog-based IoT systems, presents a comprehensive comparison of state-of-the-art ...
IoT systems can be established by connecting sensors with a distributed data transmission system for remote access, processing and storage. ...
doi:10.3390/s19081788
fatcat:iazdjbrwwfdwxfrpkwpzjf4i3m
P2 KASE A2 - Privacy Preserving Key Aggregate Searchable Encryption supporting Authentication and Access Control on Multi-Delegation
2020
IET Information Security
Therefore, the data owners (DOs) outsource their data or computational operations to the cloud service providers. ...
The proposed scheme provides security against the impersonation attack by verifying the user's authentication. ...
Therefore, the confidentiality of data along with the authentication of the user is required in a practical data sharing system based on cloud storage. ...
doi:10.1049/iet-ifs.2020.0070
fatcat:upgucuexqvaujosyymqwghlszq
« Previous
Showing results 1 — 15 out of 203 results