Search
Now showing items 1-2 of 2
Threat-specific security risk evaluation in the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ...
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
(
Elsevier B.V.
, 2021 , Article)
Data security is a challenge for end-users of cloud services as the users have no control over their data once it is transmitted to the cloud. A potentially corrupt cloud service provider can obtain the end-users’ data. ...