You are currently on the new version of our website. Access the old version .

5,291 Results Found

  • Article
  • Open Access
2 Citations
4,762 Views
25 Pages

Secure Multiparty Computation Using Secure Virtual Machines

  • Danko Miladinović,
  • Adrian Milaković,
  • Maja Vukasović,
  • Žarko Stanisavljević and
  • Pavle Vuletić

The development of new processor capabilities which enable hardware-based memory encryption, capable of isolating and encrypting application code and data in memory, have led to the rise of confidential computing techniques that protect data when pro...

  • Article
  • Open Access
99 Citations
11,474 Views
20 Pages

9 December 2021

With the advancement of different technologies such as 5G networks and IoT the use of different cloud computing technologies became essential. Cloud computing allowed intensive data processing and warehousing solution. Two different new cloud technol...

  • Article
  • Open Access
4 Citations
3,983 Views
45 Pages

Foundations of Programmable Secure Computation

  • Sven Laur and
  • Pille Pullonen-Raudvere

This paper formalises the security of programmable secure computation focusing on simplifying security proofs of new algorithms for existing computation frameworks. Security of the frameworks is usually well established but the security proofs of the...

  • Article
  • Open Access
21 Citations
9,526 Views
21 Pages

Information security has been predicted as a barrier for future sustainable computing. Regarding information security of secure sustainable computing, the role of information security managers has received attention. In particular, transformational l...

  • Article
  • Open Access
5 Citations
2,911 Views
25 Pages

Federated Secure Computing

  • Hendrik Ballhausen and
  • Ludwig Christian Hinske

Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encaps...

  • Article
  • Open Access
232 Citations
49,054 Views
35 Pages

Cloud Computing Security: A Survey

  • Issa M. Khalil,
  • Abdallah Khreishah and
  • Muhammad Azeem

3 February 2014

Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable compu...

  • Article
  • Open Access
1,803 Views
15 Pages

A Secure Median Implementation for the Federated Secure Computing Architecture

  • Christian Goelz,
  • Solveig Vieluf and
  • Hendrik Ballhausen

5 September 2024

In Secure Multiparty Computation (MPC or SMPC), functions are evaluated in encrypted peer-to-peer networks without revealing the private inputs of the participating parties. The median is a non-trivial computation in MPC and is particularly relevant...

  • Article
  • Open Access
52 Citations
47,288 Views
33 Pages

Cyberattacks and Security of Cloud Computing: A Complete Guideline

  • Muhammad Dawood,
  • Shanshan Tu,
  • Chuangbai Xiao,
  • Hisham Alasmary,
  • Muhammad Waqas and
  • Sadaqat Ur Rehman

26 October 2023

Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-...

  • Review
  • Open Access
171 Citations
18,808 Views
27 Pages

A Survey of Security in Cloud, Edge, and Fog Computing

  • Aleksandr Ometov,
  • Oliver Liombe Molua,
  • Mikhail Komarov and
  • Jari Nurmi

25 January 2022

The field of information security and privacy is currently attracting a lot of research interest. Simultaneously, different computing paradigms from Cloud computing to Edge computing are already forming a unique ecosystem with different architectures...

  • Review
  • Open Access
161 Citations
32,075 Views
25 Pages

A Review of Machine Learning Algorithms for Cloud Computing Security

  • Umer Ahmed Butt,
  • Muhammad Mehmood,
  • Syed Bilal Hussain Shah,
  • Rashid Amin,
  • M. Waqas Shaukat,
  • Syed Mohsan Raza,
  • Doug Young Suh and
  • Md. Jalil Piran

Cloud computing (CC) is on-demand accessibility of network resources, especially data storage and processing power, without special and direct management by the users. CC recently has emerged as a set of public and private datacenters that offers the...

  • Review
  • Open Access
7 Citations
4,022 Views
13 Pages

Computer-Generated Holograms Application in Security Printing

  • Evgenii Y. Zlokazov,
  • Vasilii V. Kolyuchkin,
  • Dmitrii S. Lushnikov and
  • Andrei V. Smirnov

24 March 2022

In the present article the application of computer-generated holograms in security printing was considered. The main subject was creation of informative memory marks based on CGH for automatic read out of the information embedded in this marks that c...

  • Review
  • Open Access
6 Citations
2,787 Views
19 Pages

Reliablity and Security for Fog Computing Systems

  • Egor Shiriaev,
  • Tatiana Ermakova,
  • Ekaterina Bezuglova,
  • Maria A. Lapina and
  • Mikhail Babenko

Fog computing (FC) is a distributed architecture in which computing resources and services are placed on edge devices closer to data sources. This enables more efficient data processing, shorter latency times, and better performance. Fog computing wa...

  • Article
  • Open Access
2 Citations
7,149 Views
15 Pages

Countermeasures against diverse security threats typically incur noticeable hardware cost and power overhead, which may become the obstacle for those countermeasures to be applicable in energy-efficient computing systems. This work presents a summary...

  • Review
  • Open Access
111 Citations
39,933 Views
27 Pages

Security and Privacy in Cloud Computing: Technical Review

  • Yunusa Simpa Abdulsalam and
  • Mustapha Hedabou

27 December 2021

Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability...

  • Article
  • Open Access
3 Citations
2,461 Views
15 Pages

Improved End-to-End Data Security Approach for Cloud Computing

  • Soumalya Ghosh,
  • Shiv Kumar Verma,
  • Uttam Ghosh and
  • Mohammed Al-Numay

16 November 2023

Cloud computing is one of the major cutting-edge technologies that is growing at a gigantic rate to redefine computation through service-oriented computing. It has addressed the issue of owning and managing computational infrastructure by providing s...

  • Article
  • Open Access
1 Citations
1,593 Views
18 Pages

Secure secret-sharing Single-Source Shortest Distance (SSSD) protocols, based on secure multiparty computation (SMC), offer a promising solution for securely distributing and managing sensitive information among multiple parties. However, formal secu...

  • Article
  • Open Access
7 Citations
4,468 Views
20 Pages

13 September 2022

Most modern vehicles are connected to the internet via cellular networks for navigation, assistance, etc. via their onboard computer, which can also provide onboard Wi-Fi and Bluetooth services. The main in-vehicle communication buses (CAN, LIN, Flex...

  • Article
  • Open Access
11 Citations
2,503 Views
22 Pages

4 November 2021

We consider the secure computation problem in a minimal model, where Alice and Bob each holds an input and wish to securely compute a function of their inputs at Carol without revealing any additional information about the inputs. For this minimal se...

  • Article
  • Open Access
270 Citations
37,690 Views
13 Pages

18 August 2017

Blockchain has drawn attention as the next-generation financial technology due to its security that suits the informatization era. In particular, it provides security through the authentication of peers that share virtual cash, encryption, and the ge...

  • Article
  • Open Access
1,287 Views
28 Pages

A Secure and Efficient Framework for Multimodal Prediction Tasks in Cloud Computing with Sliding-Window Attention Mechanisms

  • Weiyuan Cui,
  • Qianye Lin,
  • Jiaqi Shi,
  • Xingyu Zhou,
  • Zeyue Li,
  • Haoyuan Zhan,
  • Yihan Qin and
  • Chunli Lv

31 March 2025

An efficient and secure computation framework based on the sliding-window attention mechanism and sliding loss function was proposed to address challenges in temporal and spatial feature modeling for multimodal data processing. The framework aims to...

  • Article
  • Open Access
2 Citations
1,730 Views
17 Pages

SMWE: A Framework for Secure and Makespan-Oriented Workflow Execution in Serverless Computing

  • Hao Liang,
  • Shuai Zhang,
  • Xinlei Liu,
  • Guozhen Cheng,
  • Hailong Ma and
  • Qingfeng Wang

15 August 2024

Serverless computing is a promising paradigm that greatly simplifies cloud programming. With serverless computing, developers simply provide event-driven functions to a serverless platform, and these functions can be orchestrated as serverless workfl...

  • Article
  • Open Access
41 Citations
4,677 Views
15 Pages

The Evaluation of Software Security through Quantum Computing Techniques: A Durability Perspective

  • Hashem Alyami,
  • Mohd Nadeem,
  • Abdullah Alharbi,
  • Wael Alosaimi,
  • Md Tarique Jamal Ansari,
  • Dhirendra Pandey,
  • Rajeev Kumar and
  • Raees Ahmad Khan

11 December 2021

The primary goal of this research study, in the field of information technology (IT), is to improve the security and durability of software. A quantum computing-based security algorithm springs quite a lot of symmetrical approaches and procedures to...

  • Article
  • Open Access
6 Citations
3,166 Views
15 Pages

A Distributed Architecture for Secure Delegated Quantum Computation

  • Shuquan Ma,
  • Changhua Zhu,
  • Dongxiao Quan and
  • Min Nie

7 June 2022

In this paper, we propose a distributed secure delegated quantum computation protocol, by which an almost classical client can delegate a (dk)-qubit quantum circuit to d quantum servers, where each server is equipped with a 2k-qubit register that is...

  • Article
  • Open Access
9 Citations
3,050 Views
15 Pages

Securely Computing the Manhattan Distance under the Malicious Model and Its Applications

  • Xin Liu,
  • Xiaomeng Liu,
  • Ruiling Zhang,
  • Dan Luo,
  • Gang Xu and
  • Xiubo Chen

17 November 2022

Manhattan distance is mainly used to calculate the total absolute wheelbase of two points in the standard coordinate system. The secure computation of Manhattan distance is a new geometric problem of secure multi-party computation. At present, the ex...

  • Article
  • Open Access
8 Citations
2,655 Views
13 Pages

Secure Multi-Party Computation of Graphs’ Intersection and Union under the Malicious Model

  • Xin Liu,
  • Xiao-Fen Tu,
  • Dan Luo,
  • Gang Xu,
  • Neal N. Xiong and
  • Xiu-Bo Chen

In recent years, with the development of information security, secure multi-party computation has gradually become a research hotspot in the field of privacy protection. The intersection and union computation of graphs is an important branch of secur...

  • Article
  • Open Access
18 Citations
4,585 Views
20 Pages

Privacy-Preserving Secure Computation of Skyline Query in Distributed Multi-Party Databases

  • Mahboob Qaosar,
  • Asif Zaman,
  • Md. Anisuzzaman Siddique,
  • Annisa and
  • Yasuhiko Morimoto

25 March 2019

Selecting representative objects from a large-scale database is an essential task to understand the database. A skyline query is one of the popular methods for selecting representative objects. It retrieves a set of non-dominated objects. In this pap...

  • Article
  • Open Access
61 Citations
7,143 Views
27 Pages

AgriSecure: A Fog Computing-Based Security Framework for Agriculture 4.0 via Blockchain

  • Sasmita Padhy,
  • Majed Alowaidi,
  • Sachikanta Dash,
  • Mohamed Alshehri,
  • Prince Priya Malla,
  • Sidheswar Routray and
  • Hesham Alhumyani

3 March 2023

Every aspect of the 21st century has undergone a revolution because of the Internet of Things (IoT) and smart computing technologies. These technologies are applied in many different ways, from monitoring the state of crops and the moisture level of...

  • Article
  • Open Access
1 Citations
2,652 Views
20 Pages

14 October 2021

Computing the determinant of large matrix is a time-consuming task, which is appearing more and more widely in science and engineering problems in the era of big data. Fortunately, cloud computing can provide large storage and computation resources,...

  • Article
  • Open Access
8 Citations
3,975 Views
14 Pages

9 February 2024

With the proliferation of mobile devices and the increasing demand for low-latency and high-throughput applications, mobile edge computing (MEC) has emerged as a promising paradigm to offload computational tasks to the network edge. However, the dyna...

  • Article
  • Open Access
11 Citations
6,005 Views
22 Pages

Secure multi-party computation (SMC) is a cryptographic protocol that allows participants to compute the desired output without revealing their inputs. A variety of results related to increasing the efficiency of SMC protocol have been reported, and...

  • Article
  • Open Access
16 Citations
6,422 Views
11 Pages

Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation

  • Mariano Lemus,
  • Mariana F. Ramos,
  • Preeti Yadav,
  • Nuno A. Silva,
  • Nelson J. Muga,
  • André Souto,
  • Nikola Paunković,
  • Paulo Mateus and
  • Armando N. Pinto

12 June 2020

The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based on public-key cryptography is limited by the security and efficiency of the oblivious transfer implementation. We...

  • Article
  • Open Access
55 Citations
8,895 Views
52 Pages

Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control

  • Abdullah Al-Noman Patwary,
  • Ranesh Kumar Naha,
  • Saurabh Garg,
  • Sudheer Kumar Battula,
  • Md Anwarul Kaium Patwary,
  • Erfan Aghasian,
  • Muhammad Bilal Amin,
  • Aniket Mahanti and
  • Mingwei Gong

Fog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last few years. Fog is highly distributed and consists...

  • Article
  • Open Access
21 Citations
11,788 Views
22 Pages

A Framework for Security Transparency in Cloud Computing

  • Umar Mukhtar Ismail,
  • Shareeful Islam,
  • Moussa Ouedraogo and
  • Edgar Weippl

17 February 2016

Individuals and corporate users are persistently considering cloud adoption due to its significant benefits compared to traditional computing environments. The data and applications in the cloud are stored in an environment that is separated, managed...

  • Review
  • Open Access
66 Citations
14,664 Views
34 Pages

A Survey of Security Architectures for Edge Computing-Based IoT

  • Elahe Fazeldehkordi and
  • Tor-Morten Grønli

30 June 2022

The Internet of Things (IoT) is an innovative scheme providing massive applications that have become part of our daily lives. The number of IoT and connected devices are growing rapidly. However, transferring the corresponding huge, generated data fr...

  • Article
  • Open Access
48 Citations
10,290 Views
30 Pages

Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era

  • Michele De Donno,
  • Alberto Giaretta,
  • Nicola Dragoni,
  • Antonio Bucchiarone and
  • Manuel Mazzara

The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more...

  • Review
  • Open Access
20 Citations
7,401 Views
31 Pages

A Survey on Secure Computation Based on Homomorphic Encryption in Vehicular Ad Hoc Networks

  • Xiaoqiang Sun,
  • F. Richard Yu,
  • Peng Zhang,
  • Weixin Xie and
  • Xiang Peng

30 July 2020

In vehicular ad hoc networks (VANETs), the security and privacy of vehicle data are core issues. In order to analyze vehicle data, they need to be computed. Encryption is a common method to guarantee the security of vehicle data in the process of dat...

  • Article
  • Open Access
1 Citations
3,175 Views
53 Pages

An Evaluation of the Security of Bare Machine Computing (BMC) Systems against Cybersecurity Attacks

  • Fahad Alotaibi,
  • Ramesh K. Karne,
  • Alexander L. Wijesinha,
  • Nirmala Soundararajan and
  • Abhishek Rangi

18 September 2024

The Internet has become the primary vehicle for doing almost everything online, and smartphones are needed for almost everyone to live their daily lives. As a result, cybersecurity is a top priority in today’s world. As Internet usage has grown...

  • Article
  • Open Access
3,974 Views
19 Pages

Privacy-Aware MapReduce Based Multi-Party Secure Skyline Computation

  • Saleh Ahmed,
  • Mahboob Qaosar,
  • Asif Zaman,
  • Md. Anisuzzaman Siddique,
  • Chen Li,
  • Kazi Md. Rokibul Alam and
  • Yasuhiko Morimoto

Selecting representative objects from a large-scale dataset is an important task for understanding the dataset. Skyline is a popular technique for selecting representative objects from a large dataset. It is obvious that the skyline computation from...

  • Article
  • Open Access
196 Citations
40,694 Views
34 Pages

Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey

  • Waqas Ahmad,
  • Aamir Rasool,
  • Abdul Rehman Javed,
  • Thar Baker and
  • Zunera Jalil

Cloud computing provides the flexible architecture where data and resources are dispersed at various locations and are accessible from various industrial environments. Cloud computing has changed the using, storing, and sharing of resources such as d...

  • Article
  • Open Access
13 Citations
6,264 Views
15 Pages

11 July 2018

Cloud computing plays a major role in sharing data and resources to other devices through data outsourcing. During sharing resources, it is a challenging task to provide access control and secure write operations. The main issue is to provide secure...

  • Article
  • Open Access
3 Citations
2,214 Views
17 Pages

A Secure Multi-Party Computation Protocol for Graph Editing Distance against Malicious Attacks

  • Xin Liu,
  • Jianwei Kong,
  • Lu Peng,
  • Dan Luo,
  • Gang Xu,
  • Xiubo Chen and
  • Xiaomeng Liu

1 December 2023

The secure computation of the graph structure is an important element in the field of secure calculation of graphs, which is important in querying data in graphs, since there are no algorithms for the graph edit distance problem that can resist attac...

  • Article
  • Open Access
29 Citations
4,035 Views
20 Pages

Towards Green Computing Oriented Security: A Lightweight Postquantum Signature for IoE

  • Rinki Rani,
  • Sushil Kumar,
  • Omprakash Kaiwartya,
  • Ahmad M. Khasawneh,
  • Jaime Lloret,
  • Mahmoud Ahmad Al-Khasawneh,
  • Marwan Mahmoud and
  • Alaa Abdulsalm Alarood

8 March 2021

Postquantum cryptography for elevating security against attacks by quantum computers in the Internet of Everything (IoE) is still in its infancy. Most postquantum based cryptosystems have longer keys and signature sizes and require more computations...

  • Article
  • Open Access
16 Citations
4,127 Views
17 Pages

A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing

  • Haifeng Li,
  • Caihui Lan,
  • Xingbing Fu,
  • Caifen Wang,
  • Fagen Li and
  • He Guo

21 August 2020

With the explosion of various mobile devices and the tremendous advancement in cloud computing technology, mobile devices have been seamlessly integrated with the premium powerful cloud computing known as an innovation paradigm named Mobile Cloud Com...

  • Article
  • Open Access
3 Citations
4,587 Views
16 Pages

30 November 2023

In the era of big data, it is essential to securely and efficiently combine the large amounts of private data owned by different companies or organizations to make correct decisions. Secure Multiparty Computation (SMPC) works as a general cryptograph...

  • Article
  • Open Access
30 Citations
5,563 Views
16 Pages

10 January 2020

The integration of Internet of things (IoT) and cloud computing technology has made our life more convenient in recent years. Cooperating with cloud computing, Internet of things can provide more efficient and practical services. People can accept Io...

  • Article
  • Open Access
25 Citations
4,552 Views
20 Pages

Securing IoT-Empowered Fog Computing Systems: Machine Learning Perspective

  • Tariq Ahamed Ahanger,
  • Usman Tariq,
  • Atef Ibrahim,
  • Imdad Ullah,
  • Yassine Bouteraa and
  • Fayez Gebali

14 April 2022

The Internet of Things (IoT) is an interconnected network of computing nodes that can send and receive data without human participation. Software and communication technology have advanced tremendously in the last couple of decades, resulting in a co...

  • Article
  • Open Access
58 Citations
9,386 Views
22 Pages

Blockchain-Based Secure Storage Management with Edge Computing for IoT

  • Baraka William Nyamtiga,
  • Jose Costa Sapalo Sicato,
  • Shailendra Rathore,
  • Yunsick Sung and
  • Jong Hyuk Park

As a core technology to manage decentralized systems, blockchain is gaining much popularity to deploy such applications as smart grid and healthcare systems. However, its utilization in resource-constrained mobile devices is limited due to high deman...

  • Article
  • Open Access
4 Citations
2,616 Views
16 Pages

The Internet is an essential part of daily life with the expansion of businesses for maximizing profits. This technology has intensely altered the traditional shopping style in online shopping. Convenience, quick price comparison, saving traveling ti...

  • Article
  • Open Access
13 Citations
3,050 Views
22 Pages

22 October 2020

In this paper, we aim to provide reliable user connectivity and enhanced security for computation task offloading. Physical layer security is studied in a wireless-powered non-orthogonal multiple access (NOMA) mobile edge computing (MEC) system with...

of 106