scholarly journals A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures and Challenges

Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1811
Author(s):  
Abeer Iftikhar Tahirkheli ◽  
Muhammad Shiraz ◽  
Bashir Hayat ◽  
Muhammad Idrees ◽  
Ahthasham Sajid ◽  
...  

Cloud Computing (CC) is a promising technology due to its pervasive features, such as online storage, high scalability, and seamless accessibility, in that it plays an important role in reduction of the capital cost and workforce, which attracts organizations to conduct their businesses and financial activities over the cloud. Even though CC is a great innovation in the aspect of computing with ease of access, it also has some drawbacks. With the increase of cloud usage, security issues are proportional to the increase. To address these, there has been much work done in this domain, whereas research work considering the growing constrained applications provided by the Internet of Things (IoT) and smart city networks are still lacking. In this survey, we provide a comprehensive security analysis of CC-enabled IoT and present state-of-the-art in the research area. Finally, future research work and possible areas of implementation and consideration are given to discuss open issues.

Polymers ◽  
2021 ◽  
Vol 13 (4) ◽  
pp. 647
Author(s):  
Mohamed Saiful Firdaus Hussin ◽  
Aludin Mohd Serah ◽  
Khairul Azri Azlan ◽  
Hasan Zuhudi Abdullah ◽  
Maizlinda Izwana Idris ◽  
...  

Collecting information from previous investigations and expressing it in a scientometrics study can be a priceless guide to getting a complete overview of a specific research area. The aim of this study is to explore the interrelated connection between alginate, gelatine, and hydroxyapatite within the scope of bone tissue and scaffold. A review of traditional literature with data mining procedures using bibliometric analyses was considered to identify the evolution of the selected research area between 2009 and 2019. Bibliometric methods and knowledge visualization technologies were implemented to investigate diverse publications based on the following indicators: year of publication, document type, language, country, institution, author, journal, keyword, and number of citations. An analysis using a bibliometric study found that 7446 papers were located with the keywords “bone tissue” and “scaffold”, and 1767 (alginate), 185 (gelatine), 5658 (hydroxyapatite) papers with those specific sub keywords. The number of publications that relate to “tissue engineering” and bone more than doubled between 2009 (1352) and 2019 (2839). China, the United States and India are the most productive countries, while Sichuan University and the Chinese Academy of Science from China are the most important institutions related to bone tissue scaffold. Materials Science and Engineering C is the most productive journal, followed by the Journal of Biomedical Materials Research Part A. This paper is a starting point, providing the first bibliometric analysis study of bone tissue and scaffold considering alginate, gelatine and hydroxyapatite. A bibliometric analysis would greatly assist in giving a scientific insight to support desired future research work, not only associated with bone tissue engineering applications. It is expected that the analysis of alginate, gelatine and hydroxyapatite in terms of 3D bioprinting, clinical outcomes, scaffold architecture, and the regenerative medicine approach will enhance the research into bone tissue engineering in the near future. Continued studies into these research fields are highly recommended.


2018 ◽  
Vol 2018 ◽  
pp. 1-7 ◽  
Author(s):  
Run Xie ◽  
Chanlian He ◽  
Dongqing Xie ◽  
Chongzhi Gao ◽  
Xiaojun Zhang

With the advent of cloud computing, data privacy has become one of critical security issues and attracted much attention as more and more mobile devices are relying on the services in cloud. To protect data privacy, users usually encrypt their sensitive data before uploading to cloud servers, which renders the data utilization to be difficult. The ciphertext retrieval is able to realize utilization over encrypted data and searchable public key encryption is an effective way in the construction of encrypted data retrieval. However, the previous related works have not paid much attention to the design of ciphertext retrieval schemes that are secure against inside keyword-guessing attacks (KGAs). In this paper, we first construct a new architecture to resist inside KGAs. Moreover we present an efficient ciphertext retrieval instance with a designated tester (dCRKS) based on the architecture. This instance is secure under the inside KGAs. Finally, security analysis and efficiency comparison show that the proposal is effective for the retrieval of encrypted data in cloud computing.


2016 ◽  
pp. 221-247 ◽  
Author(s):  
Zhaolong Gou ◽  
Shingo Yamaguchi ◽  
B. B. Gupta

Cloud computing is a system, where the resources of a data center are shared using virtualization technology, such that it provides elastic, on demand and instant services to its customers and charges them based on the resources they use. In this chapter, we will discuss recent developments in cloud computing, various security issues and challenges associated with Cloud computing environment, various existing solutions provided for dealing with these security threats and will provide a comparative analysis these approaches. This will provide better understanding of the various security problems associated with the cloud, current solution space, and future research scope to deal with such attacks in better way.


2019 ◽  
Vol 11 (3) ◽  
pp. 69 ◽  
Author(s):  
Aris Leivadeas ◽  
George Kesidis ◽  
Mohamed Ibnkahla ◽  
Ioannis Lambadaris

Network Function Virtualization (NFV) has revolutionized the way network services are offered to end users. Individual network functions are decoupled from expensive and dedicated middleboxes and are now provided as software-based virtualized entities called Virtualized Network Functions (VNFs). NFV is often complemented with the Cloud Computing paradigm to provide networking functions to enterprise customers and end-users remote from their premises. NFV along with Cloud Computing has also started to be seen in Internet of Things (IoT) platforms as a means to provide networking functions to the IoT traffic. The intermix of IoT, NFV, and Cloud technologies, however, is still in its infancy creating a rich and open future research area. To this end, in this paper, we propose a novel approach to facilitate the placement and deployment of service chained VNFs in a network cloud infrastructure that can be extended using the Mobile Edge Computing (MEC) infrastructure for accommodating mission critical and delay sensitive traffic. Our aim is to minimize the end-to-end communication delay while keeping the overall deployment cost to minimum. Results reveal that the proposed approach can significantly reduce the delay experienced, while satisfying the Service Providers’ goal of low deployment costs.


Cloud computing is an internet-based service of delivering technology to users and an important technological facility where mutual resources are delivered on demand. Usage of cloud computing in educational Institutions provides students as well as administrative staff an opportunity to access various applications and knowledge swiftly. Its simplicity, upfront-cost, reduced downtime and less management effort make this service acceptable for all fragments of society particularly students and teachers. Despite the fact that the cloud computing technology is very useful, such as ease of access, cost effective. It has various issues like security violations, data confidentiality, data integrity, regional and geographical restrictions over the data. Safe cloud services are required to protect its users from different external threats such as disclosure or loss of data and compromising of users’ accounts. Users’ understanding about the cloud computing’s advantages, disadvantages and security issues can protect them from potential threats while ensuring its optimal usage in education. In this paper, a survey has been conducted to identify students understanding about the advantages, disadvantages and security issues regarding cloud computing in the educational sector. A sample of 212 respondents from graduate and undergraduate programs was taken to obtain required information. The findings reveal a lack of awareness about the use of cloud computing, its benefits, and security concerns and the implications of this deficiency are critical as multiple issues like outflow of personal data and its loss is faced by its users which may have adverse social, emotional and professional effects on student’s life. Considering the usefulness as well as the sensitivity of cloud computing in educational institutions, Authors propose maximum utilization of cloud computing in educational sector while ensuring the security of its users.


2019 ◽  
Vol 8 (4) ◽  
pp. 3440-3443

Cloud computing is attaining a pace for resolving complex computing problems. It is basically an abstracted layer of technology which has three service models: Infrastructure as a Service (IaaS), (Software as a Service) SaaS and (Platform as a Service) PaaS, which provide infrastructure, software and a platform to end-user. On the contrary, there are lots of issues which include energy efficiency, cloud integrity, data recovery, backup, etc. Security and privacy issues like data confidentiality and integrity are the most critical ones. This paper highlights the security issues related to data stored and data access from back end (service provider). It collates each and every application related to cloud and available techniques to resolve some issues. Very less research work has been done on applications and security issues of cloud computing together. This article is an analysis of cloud computing applications and security issues as it is used to a great extent. In future this paper will help research community to grab information regarding applications and techniques to resolve the issues related to Cloud computing.


2013 ◽  
Vol 797 ◽  
pp. 505-510 ◽  
Author(s):  
Wei Liu ◽  
Zhao Hui Deng ◽  
Lin Lin Wan ◽  
Qiao Ping Wu ◽  
Hao Tang

As one of the important input parameters in the grinding process, the surface topography characteristic of grinding wheel has a decisive impact on the grinding performance. To evaluate and analyze the microscopic surface topography, the premise must be able to detect the microscopic surface topography accurately. Based on the measurement of detection device and its spatial position, the surface topography detection methods have been classified, the principle has been specifically analyzed for some typical detection methods, and the research work done by domestic and foreign scholars in the area. Finally, the current problems and future research direction in the field have been analyzed.


2020 ◽  
Vol 3 (2) ◽  
pp. 268-283
Author(s):  
GU Onoja ◽  
T Aboiyar

Image segmentation is the process of partitioning a digital image into multiple segments according to some homogeneity criterion. Different approaches are suited to different types of images and the quality of output of a particular algorithm is difficult to measure quantitatively due to the fact that there may be much “correct” segmentation for a single image. Although the field encounters several challenges, this research work seeks to present a segmentation algorithm for gray intensity images. Image features extraction is first performed to obtain the approximate, if not exact, representation of a given image. Image enhancement was also carried out by exploiting the principle of histogram equalization which is one of the well-known image enhancement techniques. The proposed approach is based on the Delaunay (DT), one of the techniques in computational geometry, which generates clusters of intensity values using information from the vertices of the external boundary of triangulation. This makes it possible to produce segmented image regions. The algorithm was tested on sampled images before and after enhancement and the production compared. Our algorithm successfully extracts cogent features from a given image and made use of the Delaunay Triangulation to carry out segmentation. The method is robust, precise and independent of translation, rotation and scaling and that makes the result quite good for image segmentation. Image segmentation based on Delaunay triangulation technique seem to be a promising future research area with respect to its applicability to underwater mine and submarine detection, better target recognition, medical imaging as well as to automated computer vision.


INDIAN DRUGS ◽  
2018 ◽  
Vol 55 (10) ◽  
pp. 7-15
Author(s):  
M Waseem ◽  
◽  
A. Rauf ◽  
S. Rehman

Tribulus terrestris Linn. (Zygophyllaceae) has been used since ancient times to treat various health ailments. Different parts of the plant have been used by traditional physicians, however the dried entire fruit is more commonly used as ‘Gokshura’ and ‘Ikshugandha’ in Ayurveda and as ‘Khar-e-Khasak Khurd’ in Unani System of Medicine for its diuretic, aphrodisiac, emmenagogue, laxative, lactagogue, lithotriptic, demulcent, stomachic and astringent properties. It is therapeutically employed for its efficacy in vesicular calculi, urinary discharge, strangury, sexual debility, dysuria, burning micturation, ammenorrhoea, cough and asthma. Fruits contain traces of alkaloids, flavonoids, fixed oil, small quantity of essential oil, resins and nitrates. This review aims to provide an electronic database regarding phytopharmacological properties of T. terrestris, in particular with its description in Unani classical literature along with the recent research work done by many authors; so that future research work can be made at ease and it will help in revalidating scientifically the claimed activities of the drug mentioned in classical literatures and further exploration of any new therapeutic activity based on phyto-chemistry.


2016 ◽  
Vol 1 (2) ◽  
pp. 19-23
Author(s):  
Krutika K. Shah ◽  
Vahida U. Vadiya ◽  
Rutvij H. Jhaveri

Cloud Computing uses a network of remote servers hosted on the internet to store, manage and process data, rather than a local server or a personal computer. Cloud computing provides services on demand. In the recent time, Cloud Computing is highly demanded service because of the advantages like high computing power, less cost of services, high performance, scalability, reliability, accessibility as well as availability. To understand cloud security, there are referred high level publisher’s papers. For this review total 122 research paper of security issues in cloud computing till May 2016. For this paper included studied graphical and systematic review of various research work carried out on cloud computing. These findings show that the research in Cloud Computing received more attention over the past few years. There are referred high level publisher’s paper for better understanding about the security issues in cloud computing. This analysis would provide insights for researches, students, publishers, experts to study current research trend in cloud computing, helps to peoples for any issues about cloud computing.


Sign in / Sign up

Export Citation Format

Share Document