scispace - formally typeset
Journal ArticleDOI

Recent security challenges in cloud computing

Reads0
Chats0
TLDR
This paper will focus and explore the security challenges that are faced by cloud entities, focusing on the crypto-cloud that constitutes of different Communication, Computation, and Service Level Agreement.
About
This article is published in Computers & Electrical Engineering.The article was published on 2018-10-01. It has received 166 citations till now. The article focuses on the topics: Cloud computing & Service-level agreement.

read more

Citations
More filters
Journal ArticleDOI

An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework

TL;DR: An Efficient Algorithm for Media-based Surveillance System (EAMSuS) is proposed in IoT network for Smart City Framework, which merges two algorithms introduced by other researchers for WSN packet routing and security, while it reclaims the new media compression standard, High Efficiency Video Coding (HEVC).
Journal ArticleDOI

A survey on security challenges in cloud computing: issues, threats, and solutions

TL;DR: This work aims to analyze the different components of cloud computing as well as present security and privacy problems that these systems face, and presents new classification of recent security solutions that exist in this area.
Journal ArticleDOI

Future Trends and Current State of Smart City Concepts: A Survey

TL;DR: A survey of smart city initiatives and analyze their key concepts and different data management techniques by applying a complex literature matrix including terms, like smart people, smart economy, smart governance, smart mobility, smart environment, and smart living.
Journal ArticleDOI

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

TL;DR: This study contributes towards identifying a unified taxonomy for security requirements, threats, vulnerabilities and countermeasures to carry out the proposed end-to-end mapping and highlights security challenges in other related areas like trust based security models, cloud-enabled applications of Big Data, Internet of Things, Software Defined Network (SDN) and Network Function Virtualization (NFV).
Journal ArticleDOI

Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario

TL;DR: The features of quantum walk are utilized to construct a new S-box method which plays a significant role in block cipher techniques for 5G-IoT technologies and a new robust video encryption mechanism is proposed.
References
More filters
Journal ArticleDOI

Addressing cloud computing security issues

TL;DR: This paper proposes introducing a Trusted Third Party, tasked with assuring specific security characteristics within a cloud environment, and presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained.
Book ChapterDOI

Cryptographic cloud storage

TL;DR: This work considers the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer and describes several architectures that combine recent and non-standard cryptographic primitives to achieve this goal.
Journal ArticleDOI

Security and privacy for storage and computation in cloud computing

TL;DR: A first protocol bridging secure storage and secure computation auditing in cloud and achieving privacy cheating discouragement by designated verifier signature, batch verification and probabilistic sampling techniques is proposed, or SecCloud.
Journal ArticleDOI

Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques

TL;DR: This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders associated with it.
Journal ArticleDOI

Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques

TL;DR: In this article, an extensive survey of security and privacy issues in a cloud computing environment is presented, which aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders associated with it.
Related Papers (5)