|
|
|
Yunusa Simpa Abdulsalam and Mustapha Hedabou
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of t...
ver más
|
|
|
|
|
|
|
Ashraf Hamdan Aljammal,Hani Bani-Salameh,Ayoub Alsarhan,Mohammad Kharabsheh,Mamoon Obiedat
Pág. pp. 55 - 65
Currently, cloud computing is facing different types of threats whether from inside or outside its environment. This may cause cloud to be crashed or at least unable to provide services to the requests made by clients. In this paper, a new techniqu...
ver más
|
|
|
|
|
|
|
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o...
ver más
|
|
|
|
|
|
|
Dimitra Georgiou and Costas Lambrinoudakis
Currently, there are several challenges that cloud-based healthcare systems around the world are facing. The most important issue is to ensure security and privacy, or in other words, to ensure the confidentiality, integrity, and availability of the data...
ver más
|
|
|
|
|
|
|
Victor Chang, Lewis Golightly, Paolo Modesti, Qianwen Ariel Xu, Le Minh Thao Doan, Karl Hall, Sreeja Boddu and Anna Kobusinska
The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructures f...
ver más
|
|
|
|
|
|
|
Mohan Naik Ramachandra, Madala Srinivasa Rao, Wen Cheng Lai, Bidare Divakarachari Parameshachari, Jayachandra Ananda Babu and Kivudujogappa Lingappa Hemalatha
In recent decades, big data analysis has become the most important research topic. Hence, big data security offers Cloud application security and monitoring to host highly sensitive data to support Cloud platforms. However, the privacy and security of bi...
ver más
|
|
|
|
|
|
|
Tanweer Alam,Mohamed Benaida
Pág. pp. 74 - 84
The internet of smart devices is a network of intelligent gadgets with sensors, programs, Wi-Fi and communication network connections. These devices store the data in cloud and process data outside the device using the proposed Cloud-Internet communicati...
ver más
|
|
|
|
|
|
|
Moses Moyo and Marianne Loock
The purpose of this study was to investigate security evaluation practices among small and medium enterprises (SMEs) in small South African towns when adopting cloud business intelligence (Cloud BI). The study employed a quantitative design in which 57 S...
ver más
|
|
|
|
|
|
|
Gregorius Airlangga and Alan Liu
|
|
|
|
|
|
|
Rajasekhar Chaganti, Vijayakumar Varadarajan, Venkata Subbarao Gorantla, Thippa Reddy Gadekallu and Vinayakumar Ravi
The Internet of Things (IoT) has rapidly progressed in recent years and immensely influenced many industries in how they operate. Consequently, IoT technology has improved productivity in many sectors, and smart farming has also hugely benefited from the...
ver más
|
|
|
|
|
|
|
Huseyn Huseynov, Tarek Saadawi and Kenichi Kourai
The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual l...
ver más
|
|
|
|
|
|
|
Andrei Brazhuk
Pág. 36 - 41
This work considers challenges, related to the lack of methods of automatic threat modeling and well-formed data sources of threats and countermeasures as well as techniques to collect such security knowledge. Cloud computing domain has&nb...
ver más
|
|
|
|
|
|
|
Sakshi Chhabra,Ashutosh Kumar Singh
Pág. 296 - 307
Cloud Computing has achieved long dreamed vision of developments in IT industry such as remote storage services or privacy solutions. It is a data storage model in which data is preserved, controlled and presented over the network users. However, cloud s...
ver más
|
|
|
|
|
|
|
Michele De Donno, Alberto Giaretta, Nicola Dragoni, Antonio Bucchiarone and Manuel Mazzara
The Internet of Things (IoT) is rapidly changing our society to a world where every ?thing? is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, wh...
ver más
|
|
|
|
|
|
|
Saleh Altowaijri, Mohamed Ayari and Yamen El Touati
-
|
|
|
|
|
|
|
Ishu Gupta,Niharika Singh,Ashutosh Kumar Singh
Pág. 173 - 185
The management of data while maintaining its utility and preservation of security scheme is a matter of concern for the cloud owner. In order to minimize the overhead at cloud service provider of applying security over each document and then send it to t...
ver más
|
|
|
|
|
|
|
Olusola Akinrolabu, Steve New and Andrew Martin
Security and privacy concerns represent a significant hindrance to the widespread adoption of cloud computing services. While cloud adoption mitigates some of the existing information technology (IT) risks, research shows that it introduces a new set of ...
ver más
|
|
|
|
|
|
|
Osman Ghazali,Chun Yang Leow,Shahzad Qaiser,Nanthini Pattabiraman,Sathiyaroobaa Vasuthevan,Eman Mohamed Abdusalam,Mustafa M. Barakat
Pág. pp. 96 - 116
Customer disposition to data, nature of the information on site, protection concerns, trust, security concerns, and the notoriety of organization efficaciously affect the trust of Internet shoppers in the site. Two noteworthy and basic issues for e-comme...
ver más
|
|
|
|
|
|
|
Boubakeur Annane,Osman Ghazali
Pág. pp. 20 - 32
The principle constraints of mobile devices are their limited resources such as processing capability, storage space and battery life. While cloud computing offers a vast computing resources services. A new idea emerged by including the cloud computing i...
ver más
|
|
|
|
|
|
|
Qiuyan Liu, Mingwu Wang, Xiao Wang, Fengqiang Shen and Juliang Jin
The evaluation of land eco-security is challenging because it is involved with various uncertainty factors. Although the normal cloud model provides an idea for dealing with the randomness and fuzziness of indicators for the evaluation of land eco-securi...
ver más
|
|
|
|