Cloud Computing Trends: A Literature Review
暂无分享,去创建一个
[1] Seyed Aliakbar Mousavi,et al. Adoption of Cloud Computing among Enterprises in Malaysia , 2016 .
[2] Prashant Pandey,et al. Cloud computing , 2010, ICWET.
[3] Vladimir Stantchev,et al. Governance, Risk, and Compliance in Cloud Scenarios , 2019, Applied Sciences.
[4] Geng Yang,et al. A privacy protection-oriented parallel fully homomorphic encryption algorithm in cyber physical systems , 2019, EURASIP J. Wirel. Commun. Netw..
[5] K. Ruba Soundar,et al. A Novel Securable Fuzzy Logic Based Ranking Scheme for Document Searching on Outsourced Cloud Data , 2019, Wirel. Pers. Commun..
[6] Gexiang Zhang,et al. Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain , 2019, Inf. Sci..
[7] Dongxi Liu,et al. Unified Fine-Grained Access Control for Personal Health Records in Cloud Computing , 2019, IEEE Journal of Biomedical and Health Informatics.
[8] Xianmin Wang,et al. Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing , 2019, J. Parallel Distributed Comput..
[9] Xiaojun Zhang,et al. Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber-physical systems , 2019, Pervasive Mob. Comput..
[10] Ke Xu,et al. A Survey of Research on Mobile Cloud Computing , 2011, 2011 10th IEEE/ACIS International Conference on Computer and Information Science.
[11] Huiyong Wang,et al. Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs , 2019, IEEE Transactions on Information Forensics and Security.
[12] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[13] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[14] Bo Hu,et al. Everything as a Service (XaaS) on the Cloud: Origins, Current and Future Trends , 2015, 2015 IEEE 8th International Conference on Cloud Computing.
[15] Jie Cui,et al. OOABKS: Online/offline attribute-based encryption for keyword search in mobile cloud , 2019, Inf. Sci..
[16] Sukhwinder Singh,et al. Mobile Cloud Computing , 2014 .
[17] Hans D. Schotten,et al. Access Schemes for Mobile Cloud Computing , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[18] Qiang Ye,et al. A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks , 2019, Inf. Fusion.
[19] Zehra Sura,et al. Collaborative and Accountable Hardware Governance Using Blockchain , 2018, 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC).
[20] Mircea Georgescu,et al. IT Governance in Cloud , 2014 .
[21] S. Ganapathy,et al. A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications , 2019, Comput. Networks.
[22] Z. Maamar,et al. Role assigning and taking in cloud computing , 2019, Human Systems Management.
[23] B. Asvija,et al. Security in hardware assisted virtualization for cloud computing - State of the art issues and challenges , 2019, Comput. Networks.
[24] Qiang Zhang,et al. Enabling Cooperative Privacy-preserving Personalized search in cloud environments , 2019, Inf. Sci..
[25] Ezz El-Din Hemdan,et al. IFHDS: Intelligent Framework for Securing Healthcare BigData , 2019, Journal of Medical Systems.
[26] Ramraj Dangi,et al. An Improved Authentication and Data Security Approach Over Cloud Environment , 2019 .
[27] Jianhua Chen,et al. Privacy-Preserving and Efficient Truly Three-Factor Authentication Scheme for Telecare Medical Information Systems , 2018, Journal of Medical Systems.
[28] Hao Wang,et al. Privacy-preserving data search with fine-grained dynamic search right management in fog-assisted Internet of Things , 2019, Inf. Sci..
[29] Qiaoyan Wen,et al. Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System , 2019, Wirel. Pers. Commun..
[30] Antonio A. de A. Rocha,et al. Calculating the trust of providers through the construction weighted Sec-SLA , 2019, Future Gener. Comput. Syst..
[31] Navpreet Kaur Walia,et al. Survey on Mobile Cloud Computing , 2024, Advances in Robotic Technology.
[32] Ahmad Ashari,et al. Cloud Computing : Solusi ICT ? , 2011 .
[33] Musheer Ahmad,et al. A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS , 2019, Telematics Informatics.
[34] Chengyu Hu,et al. Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial , 2019, J. Netw. Comput. Appl..
[35] Zhihui Lu,et al. Data Privacy Protection for Edge Computing of Smart City in a DIKW Architecture , 2019, Eng. Appl. Artif. Intell..
[36] Yaping Lin,et al. A lightweight privacy and integrity preserving range query scheme for mobile cloud computing , 2019, Comput. Secur..
[37] Rajkumar Buyya,et al. Next generation cloud computing: New trends and research directions , 2017, Future Gener. Comput. Syst..
[38] Tao Zhang,et al. A lightweight secure conjunctive keyword search scheme in hybrid cloud , 2019, Future Gener. Comput. Syst..
[39] Ralf Klamma,et al. Mobile Cloud Computing: A Comparison of Application Models , 2011, ArXiv.
[40] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[41] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[42] Hatim Hafiddi,et al. Toward a unified framework for Cloud Computing governance: An approach for evaluating and integrating IT management and governance models , 2019, Comput. Stand. Interfaces.
[43] Perry Cheng,et al. Serverless Computing: Current Trends and Open Problems , 2017, Research Advances in Cloud Computing.
[44] Hamid Harroud,et al. Mobile cloud computing for computation offloading: Issues and challenges , 2018 .
[45] Qing Yang,et al. A dual privacy-preservation scheme for cloud-based eHealth systems , 2019, J. Inf. Secur. Appl..
[46] Josep Domingo-Ferrer,et al. Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges , 2019, Comput. Commun..
[47] Xin Jiang,et al. A Blockchain-Based Scheme for Secure Sharing of X-Ray Medical Images , 2018 .
[48] Albert Y. Zomaya,et al. Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities , 2019, J. Parallel Distributed Comput..
[49] Fuchun Guo,et al. Privacy-Preserving Certificateless Cloud Auditing with Multiple Users , 2019, Wirel. Pers. Commun..
[50] Yasmine Abouelseoud,et al. Effect of chosen features on performance of privacy preserving image retrieval systems , 2019, Comput. Electr. Eng..
[51] Hans P. Borgman,et al. Cloudrise: Exploring Cloud Computing Adoption and Governance with the TOE Framework , 2013, 2013 46th Hawaii International Conference on System Sciences.
[52] Qinghua Zheng,et al. Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT , 2019, IEEE Transactions on Information Forensics and Security.
[53] Mazliza Othman,et al. A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.
[54] Eugene Marinelli,et al. Hyrax: Cloud Computing on Mobile Devices using MapReduce , 2009 .
[55] Albert Y. Zomaya,et al. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing , 2019 .