2017
DOI: 10.1109/tcc.2016.2582278
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Security Engineering: Theory, Practice and Future Research

Abstract: This is the accepted version of the paper.This version of the publication may differ from the final published version. Permanent repository link:

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 27 publications
0
12
0
Order By: Relevance
“…The analysis might be improving the efficiency of the scheme as the squashing technique is time consuming. Kim-Kwang Raymond Choo et al [15] presented potential topics for future research work in cloud security engineering. They include advanced security features, cloud-based intrusion detection and prevention systems, distributed authentication and authentication, implementation of cryptographic and key management strategies in clouds (e.g.…”
Section: Related Workmentioning
confidence: 99%
“…The analysis might be improving the efficiency of the scheme as the squashing technique is time consuming. Kim-Kwang Raymond Choo et al [15] presented potential topics for future research work in cloud security engineering. They include advanced security features, cloud-based intrusion detection and prevention systems, distributed authentication and authentication, implementation of cryptographic and key management strategies in clouds (e.g.…”
Section: Related Workmentioning
confidence: 99%
“…EIoT consists of different devices such as edge router (gateway node), various users and smart devices. Most of the time interested users can access real-time data possessed by the smart devices [3,[5][6][7][8]. For such kind of communication environment, edge computing provides additional benefits such as "enhanced security, decreased bandwidth and reduced latency".…”
Section: Introductionmentioning
confidence: 99%
“…In an edge‐based IoT environment, there are cloud servers, edge nodes (gateways), different types of users, and smart devices (ie, smart ac controller). In such an environment, the users are usually interested to access the “real‐time data possessed by the smart devices.” Edge‐based IoT environment offers various services including “data, storage, compute, and application services to the end‐users” as the cloud computing also performs these mentioned functions . In such an environment, edge node provides several benefits including “enhanced security, decreased bandwidth and reduced latency.” Therefore, it becomes a promising technology for numerous IoT services.…”
Section: Introductionmentioning
confidence: 99%
“…5,6 Edge-based IoT environment offers various services including "data, storage, compute, and application services to the end-users" as the cloud computing also performs these mentioned functions. 4,[6][7][8][9] In such an environment, edge node provides several benefits including "enhanced security, decreased bandwidth and reduced latency." Therefore, it becomes a promising technology for numerous IoT services.…”
Section: Introductionmentioning
confidence: 99%