scispace - formally typeset
Journal ArticleDOI

Security in cloud computing

TLDR
The security issues that arise due to the very nature of cloud computing are detailed and the recent solutions presented in the literature to counter the security issues are presented.
About
This article is published in Information Sciences.The article was published on 2015-06-01. It has received 694 citations till now. The article focuses on the topics: Cloud computing security & Cloud computing.

read more

Citations
More filters
Journal ArticleDOI

A survey on cloud computing security

TL;DR: This survey presents a comprehensive overview of the security issues for different factors affecting cloud computing, and encompasses the requirements for better security management and suggests 3-tier security architecture.
Journal ArticleDOI

Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics

TL;DR: This review provides useful information and insights to researchers and practitioners who are interested in cybersecurity of IoT, including the current research of IoT cybersecurity, IoT cybersecurity architecture and taxonomy, key enabling countermeasures and strategies, major applications in industries, research trends and challenges.
Journal ArticleDOI

Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control

TL;DR: PASH is introduced, a privacy-aware s-health access control system, in which the key ingredient is a large universe CP-ABE with access policies partially hidden, and attribute values of access policies are hidden in encrypted SHRs and only attribute names are revealed.
Journal ArticleDOI

Cloud security issues and challenges

TL;DR: The basic features of the cloud computing, security issues, threats and their solutions are discussed, and several key topics related to the cloud, namely cloud architecture framework, service and deployment model, cloud technologies, cloud security concepts, threats, and attacks are described.

Mobile Cloud Computing

TL;DR: A survey of MCC is given, which helps general readers have an overview of the MCC including the definition, architecture, applications, recent research work, and future research trends.
References
More filters
ReportDOI

The NIST Definition of Cloud Computing

Peter Mell, +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Book ChapterDOI

Fuzzy identity-based encryption

TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content

Fuzzy Identity Based Encryption.

TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Journal ArticleDOI

Review: A survey on security issues in service delivery models of cloud computing

TL;DR: A survey of the different security risks that pose a threat to the cloud is presented and a new model targeting at improving features of an existing model must not risk or threaten other important features of the current model.
Journal ArticleDOI

A survey of mobile cloud computing: architecture, applications, and approaches

TL;DR: A survey of MCC is given, which helps general readers have an overview of the MCC including the definition, architecture, and applications and the issues, existing solutions, and approaches are presented.
Related Papers (5)