Article
Computer Science, Information Systems
Seongmo An, Asher Leung, Jin B. Hong, Taehoon Eom, Jong Sou Park
Summary: This paper introduces CloudSafe, a cloud security assessment and enforcement tool that collates various security tools to provide automated security assessment and optimal security control implementation for businesses. The experimental results demonstrate that CloudSafe is effective in assisting security administrators to select appropriate security countermeasures to protect their cloud services.
Article
Computer Science, Hardware & Architecture
Claudio Correia, Miguel Correia, Luis Rodrigues
Summary: This article presents the design and implementation of a secure event ordering service for fog nodes. The service leverages a Trusted Execution Environment (TEE) to provide guarantees regarding the order of events, even when fog nodes are compromised.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Engineering, Industrial
Y. H. Pan, T. Qu, N. Q. Wu, M. Khalgui, G. Q. Huang
Summary: This paper proposes a multi-level cloud computing enabled digital twin system for the real-time monitor, decision and control of a synchronized production logistics system, aiming to address the challenges brought by increasing demands for customized products.
JOURNAL OF MANUFACTURING SYSTEMS
(2021)
Article
Computer Science, Hardware & Architecture
N. Mansouri, M. M. Javidi, B. Mohammad Hasani Zade
Summary: Cloud computing has a significant impact on information technology solutions for organizations and researchers, with data fragmentation and replication algorithms playing a crucial role in enhancing data security. The proposed CSO-based SDR method effectively balances objectives through an intelligent fuzzy inference system.
JOURNAL OF SUPERCOMPUTING
(2021)
Article
Computer Science, Information Systems
Nawaf Alharbe, Abeer Aljohani, Mohamed Ali Rakrouki
Summary: Cloud computing has gained extensive attention due to its convenience and ubiquity. However, security issues, particularly related to multi-tenancy and virtualization, pose obstacles to its development. This paper proposes a data partitioning method to prevent privacy leakage in a multi-tenant scenario, specifically in protecting patient data in health informatics. Experimental results demonstrate the effectiveness of the proposed algorithm in fine-grained attribute partitioning and sensitive information protection.
Article
Computer Science, Information Systems
Adnan Alrabea
Summary: Cloud computing is rapidly growing as an alternative to conventional IT outsourcing. This paper proposes a modified Boneh-Lynn-Shachame dynamic auditing algorithm for the public audit process in cloud data storage, aiming to protect privacy.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Computer Science, Information Systems
Zhibo Wang, Defang Liu, Yunan Sun, Xiaoyi Pang, Peng Sun, Feng Lin, John C. S. Lui, Kui Ren
Summary: With the development of communication technologies and IoT infrastructures, home automation systems have become popular for providing convenient smart-home services. However, there are security risks in the deployment and application of these systems, which require research on attack and defense. This paper presents a comprehensive survey on the security of home automation systems, including system architecture, attack classification, vulnerability analysis, security requirements, existing defense methods, and open issues for future research.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2022)
Article
Computer Science, Information Systems
Mohammad Babar, Muhammad Sohail Khan, Farman Ali, Muhammad Imran, Muhammad Shoaib
Summary: Cloudlet is a new computing paradigm designed to meet the requirements of the Internet of things (IoT) by bringing computing resources to the edge of a network. This study introduces a taxonomy of cloudlet applications and explores its application in resource-constrained IoT devices and compute-intensive tasks. It also highlights the potential of cloudlets to support smart systems and applications requiring high-quality service.
Review
Computer Science, Hardware & Architecture
Ahmad Salah AlAhmad, Hasan Kahtan, Yehia Ibrahim Alzoubi, Omar Ali, Ashraf Jaradat
Summary: Mobile cloud computing (MCC) is a popular technology, but it currently faces critical security issues including authentication, privacy, and trust. Existing MCC models lack comprehensive protection for data, resources, and communication channels. Further research and design solutions are needed from model developers and practitioners.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Najme Mansouri, Mohammad Masoud Javidi, Behnam Mohammad Hasani Zade
Summary: The cloud computing environment is becoming more interesting with data replication being widely applied. A proposed dynamic replication algorithm, HDRS, effectively manages replicas based on actual needs to reduce response time and bandwidth usage. It can identify popular files and replicate them to optimal sites, avoiding useless replications and improving load balancing.
FRONTIERS OF COMPUTER SCIENCE
(2021)
Article
Computer Science, Software Engineering
Itzhak Aviv, Ruti Gafni, Sofia Sherman, Berta Aviv, Asher Sterkin, Etzik Bega
Summary: This article identifies 14 fundamental cloud infrastructure procedures (CIPs) and their associated challenges in software development processes on the public cloud. It evaluates and highlights the limitations of leading cloud automation technologies, such as infrastructure as code, in enabling these CIPs.
Article
Computer Science, Information Systems
Manreet Sohal, Sandeep Sharma
Summary: Cloud computing enables convenient storage and management of large volumes of data, but concerns such as data security, privacy, and reliability must be addressed. Cloud data encryption plays a crucial role in protecting data, and the newly proposed encryption technique outperforms traditional algorithms in terms of performance.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Automation & Control Systems
Sandeep Kautish, A. Reyana, Ankit Vidyarthi
Summary: DDoS attacks are widespread in distributed cloud environments, causing financial losses and rendering services unavailable to legitimate users. This article proposes a novel DDoS mitigation strategy using a distributed denial-of-service mitigation tree architecture, which includes integrated network monitoring for detection procedures.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Computer Science, Artificial Intelligence
Shohin Aheleroff, Xun Xu, Ray Y. Zhong, Yuqian Lu
Summary: Recent findings show that Digital Twin can provide services to multiple stakeholders, but a sophisticated reference architecture, suitable technologies, and a proper business model are needed. Most studies in the field focus on manufacturing, while empirical research on the relationship between Digital Twin and mass individualization is lacking. The study aims to identify suitable Industry 4.0 technologies and a comprehensive reference architecture model for challenging Digital Twin applications, indicating a significant relationship between Digital Twin capabilities as a service and mass individualization.
ADVANCED ENGINEERING INFORMATICS
(2021)
Article
Computer Science, Theory & Methods
Yaru Liu, Jia Yu, Ming Yang, Wenqiang Hou, Huaqun Wang
Summary: With the deep integration of cloud computing and Internet of Things, privacy preserving keyword search techniques have gained importance. Forward security and verifiability are two important security properties for privacy preserving keyword search. This study proposes a scheme that simultaneously achieves forward security and full verification in protecting privacy for keyword search.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2022)
Article
Computer Science, Information Systems
Nicolae Paladi, Christian Gehrmann, Antonis Michalas
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2017)
Proceedings Paper
Computer Science, Information Systems
Martin Gunnarsson, Christian Gehrmann
Summary: This paper presents a protocol for secure ownership transfer of constrained IoT devices. The protocol is resource-efficient and relies solely on symmetric cryptography. It has been rigorously analyzed for security requirements and its resource efficiency has been demonstrated through a proof of concept implementation.
INFORMATION SYSTEMS SECURITY AND PRIVACY, ICISSP 2020
(2022)
Article
Computer Science, Information Systems
Christian Gehrmann, Marcus Rodan, Niklas Jonsson
EURASIP JOURNAL ON INFORMATION SECURITY
(2019)