2018
DOI: 10.1007/978-3-319-73676-1_10
|View full text |Cite
|
Sign up to set email alerts
|

Optimization of Security as an Enabler for Cloud Services and Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…The network segment should be kept under monitoring for any potential unexpected traffic and be subjected to the necessary response [26]. The study in [8] focused on efficient message filtering for privacy-preserving authentication and secure packet forwarding for aggregated transmission evidence generation. Privacy of identification, location, input, output privacy, and function privacy is required for IoT security.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The network segment should be kept under monitoring for any potential unexpected traffic and be subjected to the necessary response [26]. The study in [8] focused on efficient message filtering for privacy-preserving authentication and secure packet forwarding for aggregated transmission evidence generation. Privacy of identification, location, input, output privacy, and function privacy is required for IoT security.…”
Section: Literature Reviewmentioning
confidence: 99%
“…According to the report "State of IoT Security" a 22% increase has been observed in cyber attacks on IoT applications. In addition, such attacks being highly graded and sophisticated indicate serious concerns [8,9]. As devices have limited processing and storage capabilities, smart devices are vulnerable to assaults as these devices violate many policies regarding security [10,11].…”
Section: Introductionmentioning
confidence: 99%
“…Cloud computing has mainly faced security challenges on four levels which are network level, data level, user authentication level, and generic level [22,[62][63][64][65]. These above mentioned security challenges which big data faces on cloud are discussed in detail below: Distributed Nodes: this is a network level issue where all the nodes are connected with each other and data flow can be occurred any-where across the nodes.…”
Section: Introductionmentioning
confidence: 99%
“…Authors of [49] consider security policy implementation as the most challenging task in cloud computing for service providers. The key challenges include also:…”
mentioning
confidence: 99%