| 系統識別號 | U0002-2006202414465300 |
|---|---|
| DOI | 10.6846/tku202400279 |
| 論文名稱(中文) | 以系統文獻綜述探討雲端架構下的資訊安全 |
| 論文名稱(英文) | Information Security Management in Cloud-A Systematic Literature Review |
| 第三語言論文名稱 | |
| 校院名稱 | 淡江大學 |
| 系所名稱(中文) | 資訊管理學系碩士班 |
| 系所名稱(英文) | Department of Information Management |
| 外國學位學校名稱 | |
| 外國學位學院名稱 | |
| 外國學位研究所名稱 | |
| 學年度 | 112 |
| 學期 | 2 |
| 出版年 | 113 |
| 研究生(中文) | 黃敬婷 |
| 研究生(英文) | Ching-Ting Huang |
| 學號 | 612630052 |
| 學位類別 | 碩士 |
| 語言別 | 繁體中文 |
| 第二語言別 | |
| 口試日期 | 2024-06-01 |
| 論文頁數 | 52頁 |
| 口試委員 |
指導教授
-
游佳萍(cpyu@mail.tku.edu.tw)
口試委員 - 黃莉君 口試委員 - 張簡郁庭 口試委員 - 游佳萍 |
| 關鍵字(中) |
雲端 資訊安全 雲端資安 系統文獻綜述 |
| 關鍵字(英) |
Cloud Information Security Cloud Security Systematic Literature Review |
| 第三語言關鍵字 | |
| 學科別分類 | |
| 中文摘要 |
本研究旨在探討雲端資訊安全現況的重要研究主題和趨勢,以及安全技術的演進如何應對不斷演變的威脅。本研究的文獻將雲端運算(Cloud Computing)分成三種類別:適應性(Adaptation)、資訊安全治理(ISG Cloud)和雲端部署(Cloud Deployment);資訊安全(Information Security)分成四種類別:資料安全(Data Security)、身份和訪問管理(IAM)、安全技術(Security Techniques)和威脅(Threat)。接著,本研究透過系統文獻綜述(SLR),選擇2013至2023年間的文獻進行研究,其中檢索策略包含八階段,從確定研究領域和主題相關性開始,到最終確認和選擇符合研究的需求,最終篩選出108篇文獻。研究結果指出「雲端」和「資訊安全」的數量都是逐年增加的。其中,雲端中的「資訊安全治理」持續受到重視和深入研究的核心議題,文獻大致集中在管理層面的討論,而對技術層面的探討相對較少,因此本研究根據研究結果給出實務應用上的建議,建議未來的研究者可以參考本研究的發現,將學術研究的成果有效應用於實務操作,進行更多的實證研究。 |
| 英文摘要 |
This study aims to delve into the crucial research themes and trends in cloud information security, and how security solutions have evolved to tackle ever-changing threats. The study was carried out using a rigorous and comprehensive systematic literature review (SLR) process. The literature on cloud computing is divided into three distinct areas: adaptation, information security governance (ISG Cloud), and cloud deployment. Information security is further divided into four distinct areas: data security, identity and access management (IAM), security techniques, and threats. The review process, which is structured into eight stages, begins with the identification of study areas and relevant themes, and concludes with the final confirmation and selection of literature that meets the research requirements, resulting in the inclusion of 108 articles. The research findings indicate a consistent annual growth in the amount of literature on both "cloud computing" and "information security," which has important practical consequences. The significance of "information security governance" as a fundamental concern in cloud computing is emphasized. Existing literature predominantly concentrates on management-level deliberations, while technological elements receive comparatively less attention. This study offers practical advice based on these findings, which can be utilized by future researchers to effectively implement academic research outcomes into actual operations, hence conducting additional empirical investigations. The purpose of these recommendations is to close the divide between theoretical research and practical implementation, thereby improving the overall efficacy of cloud information security. |
| 第三語言摘要 | |
| 論文目次 |
目錄 第一章 緒論 1 1.1研究背景 1 1.2研究目標 2 第二章 文獻探討 3 2.1 雲端運算分布 3 2.2雲端在資訊安全上的考量 5 第三章 研究方法 8 3.1 研究問題和目標 9 3.2檢索策略 9 3.3信效度評估 16 第四章 研究結果 18 4.1時間序分析 18 4.1.1 雲端和資訊安全文獻年代分布 18 4.1.2 雲端文獻年代分布 19 4.1.3 資訊安全文獻年代分布 20 4.2類別分析 21 4.2.1資訊安全治理(ISG)及資料安全(Data Security) 22 4.2.2 資訊安全治理(ISG)及身份識別與存取管理(IAM) 24 4.2.3 資訊安全治理(ISG)及威脅(Threat) 26 第五章 結論與未來展望 30 圖目錄 圖 1系統流程圖 8 圖 2檢索策略流程圖 9 圖 3雲端和資訊安全文獻年代分布 19 圖 4雲端文獻年代分布 20 圖 5資訊安全文獻年代分布 21 表目錄 表 1 雲端類別之引用文獻 5 表 2資安類別之引用文獻 7 表 3期刊包含在各資料庫的情況 13 表 4初步於PROQUEST篩選後的文獻數量 15 表 5雲端及資安之第一階類別分布 22 表 6資訊安全治理(ISG)及資料安全(DATA SECURITY)之類別分佈 23 表 7技術資產及隱私交集之文獻 24 表 8資訊安全治理(ISG)及身份識別與存取管理(IAM)之類別分佈 25 表 9技術資產及授權交集之文獻 26 表 10資訊安全治理(ISG)及威脅(THREAT)之類別分佈 27 表 11技術資產及外部威脅交集之文獻 28 表 12分析與其他文獻不同之處 29 |
| 參考文獻 |
Aamir, M., Hong, X., Wagan, A. A., & Tahir, M. (2014). Cloud computing security challenges and their compromised attributes. International Journal of Scientific Engineering and Technology, 3(4), 395-399. Agbaegbu, J., Arogundade, O. T., Misra, S., & Damaševičius, R. (2021). Ontologies in cloud computing—review and future directions. Future Internet, 13(12), 302. AlAhmad, A. S., Kahtan, H., Alzoubi, Y. I., Ali, O., & Jaradat, A. (2021). Mobile cloud computing models security issues: A systematic review. Journal of Network and Computer Applications, 190, 103152. Ahmadian, M., Plochan, F., Roessler, Z., & Marinescu, D. C. (2017). SecureNoSQL: An approach for secure search of encrypted NoSQL databases in the public cloud. International Journal of Information Management, 37(2), 63-74. Alani, M. M., & Tawfik, H. (2022). Phishnot: A cloud-based machine-learning approach to phishing URL detection. Computer Networks, 218, 109407. Ali, M., Mohajeri, J., Sadeghi, M. R., & Liu, X. (2020). Attribute-based fine-grained access control for outscored private set intersection computation. Information Sciences, 536, 222-243. Alizadeh, M., Abolfazli, S., Zamani, M., Baharun, S., & Sakurai, K. (2016). Authentication in mobile cloud computing: A survey. Journal of Network and Computer Applications, 61, 59-80. Alonso, J., Orue-Echevarria, L., Casola, V., Torre, A. I., Huarte, M., Osaba, E., & Lobo, J. L. (2023). Understanding the challenges and novel architectural models of multi-cloud native applications–a systematic literature review. Journal of Cloud Computing, 12(1), 1-34. Alouffi, B., Hasnain, M., Alharbi, A., Alosaimi, W., Alyami, H., & Ayaz, M. (2021). A systematic literature review on cloud computing security: Threats and mitigation strategies. IEEE Access, 9, 57792-57807. Amanlou, S., Hasan, M. K., & Bakar, K. A. A. (2021). Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model. Computer Networks, 199, 108465. Amato, F., Mazzocca, N., & Moscato, F. (2018). Model driven design and evaluation of security level in orchestrated cloud services. Journal of Network and Computer Applications, 106, 78-89. Ammi, M., Alarabi, S., & Benkhelifa, E. (2021). Customized blockchain-based architecture for secure smart home for lightweight IoT. Information Processing & Management, 58(3), 102482. Arce, D. (2022). Security-induced lock-in in the cloud. Business & Information Systems Engineering, 64(4), 501-513. Arce, D. G. (2020). Cybersecurity and platform competition in the cloud. Computers & Security, 93, 101774. Baig, Z. A., Sait, S. M., & Binbeshr, F. (2016). Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks. Computer Networks, 97, 31-47. Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., & Attia, R. (2018). Phoabe: Securely outsourcing multi-authority attribute-based encryption with policy hidden for cloud assisted IoT. Computer Networks, 133, 141-156. Bienhaus, D., Ebner, A., Jäger, L., Rieke, R., & Krauß, C. (2021). Secure gate: Secure gateways and wireless sensors as enablers for sustainability in production plants. Simulation Modelling Practice and Theory, 109, 102282. Birje, M. N., Challagidad, P. S., Goudar, R., & Tapale, M. T. (2017). Cloud computing review: Concepts, technology, challenges and security. International Journal of Cloud Computing, 6(1), 32-57. Calvo, M., & Beltrán, M. (2022). A model for risk-based adaptive security controls. Computers & Security, 115, 102612. Celesti, A., Fazio, M., Villari, M., & Puliafito, A. (2016). Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems. Journal of Network and Computer Applications, 59, 208-218. Chang, V., Ramachandran, M., Yao, Y., Kuo, Y. H., & Li, C. S. (2016). A resiliency framework for an enterprise cloud. International Journal of Information Management, 36(1), 155-166. Chattaraj, D., Sarma, M., & Das, A. K. (2018). A new two-server authentication and key agreement protocol for accessing secure cloud services. Computer Networks, 131, 144-164. Chen, L., Li, J., Lu, Y., & Zhang, Y. (2020). Adaptively secure certificate-based broadcast encryption and its application to cloud storage service. Information Sciences, 538, 273-289. Chiregi, M., & Navimipour, N. J. (2018). Cloud computing and trust evaluation: A systematic literature review of the state-of-the-art mechanisms. Journal of Electrical Systems and Information Technology, 5(3), 608-622. Cui, H., Deng, R. H., Lai, J., Yi, X., & Nepal, S. (2018). An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited. Computer Networks, 133, 157-165. De Souza, C. A., Westphall, C. B., Machado, R. B., Loffi, L., Westphall, C. M., & Geronimo, G. A. (2022). Intrusion detection and prevention in fog based IoT environments: A systematic literature review. Computer Networks, 214, 109154. Dos Santos, D. R., Marinho, R., Schmitt, G. R., Westphall, C. M., & Westphall, C. B. (2016). A framework and risk assessment approaches for risk-based access control in the cloud. Journal of Network and Computer Applications, 74, 86-97. Esposito, C. (2018). Interoperable, dynamic and privacy-preserving access control for cloud data storage when integrating heterogeneous organizations. Journal of Network and Computer Applications, 108, 124-136. Fabian, B., Ermakova, T., & Junghanns, P. (2015). Collaborative and secure sharing of healthcare data in multi-clouds. Information Systems, 48, 132-150. Fan, K., Luo, Q., Zhang, K., & Yang, Y. (2020). Cloud-based lightweight secure RFID mutual authentication protocol in IoT. Information Sciences, 527, 329-340. Frimpong, E., Michalas, A., & Ullah, A. (2022). Footsteps in the fog: Certificateless fog-based access control. Computers & Security, 121, 102866. Gao, X., Yu, J., Shen, W. T., Chang, Y., Zhang, S. B., Yang, M., & Wu, B. (2021). Achieving low-entropy secure cloud data auditing with file and authenticator deduplication. Information Sciences, 546, 177-191. Ganapathy, S. (2019). A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications. Computer Networks, 151, 181-190. Gayathri, J., & Subashini, S. (2019). An efficient spatiotemporal chaotic image cipher with an improved scrambling algorithm driven by dynamic diffusion phase. Information Sciences, 489, 227-254. Guan, Z., Zhang, Y., Wu, L., Wu, J., Li, J., Ma, Y., & Hu, J. (2019). APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT. Journal of Network and Computer Applications, 125, 82-92. Han, N. D., Han, L., Tuan, D. M., In, H. P., & Jo, M. (2014). A scheme for data confidentiality in cloud-assisted wireless body area networks. Information Sciences, 284, 157-166. Heidari, A., & Jafari Navimipour, N. (2022). Service discovery mechanisms in cloud computing: A comprehensive and systematic literature review. Kybernetes, 51(3), 952-981. Hidayat, T., & Mahardiko, R. (2020). A systematic literature review method on AES algorithm for data sharing encryption on cloud computing. International Journal of Artificial Intelligence Research, 4(1), 49-57. Hosseinzadeh, S., Rauti, S., Laurén, S., Mäkelä, J. M., Holvitie, J., Hyrynsalmi, S., & Leppänen, V. (2018). Diversification and obfuscation techniques for software security: A systematic literature review. Information and Software Technology, 104, 72-93. Hu, G., Xiao, D., Xiang, T., Bai, S., & Zhang, Y. (2017). A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud. Information Sciences, 387, 132-145. Humayun, M., Niazi, M., Almufareh, M. F., Jhanjhi, N., Mahmood, S., & Alshayeb, M. (2022). Software-as-a-service security challenges and best practices: A multivocal literature review. Applied Sciences, 12(8), 3953. Iqbal, S., Kiah, M. L. M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., & Choo, K. K. R. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications, 74, 98-120. Jaatun, M. G., Pearson, S., Gittler, F., Leenes, R., & Niezen, M. (2020). Enhancing accountability in the cloud. International Journal of Information Management, 53, 101498. Kaw, J. A., Loan, N. A., Parah, S. A., Muhammad, K., Sheikh, J. A., & Bhat, G. M. (2019). A reversible and secure patient information hiding system for IoT driven e-health. International Journal of Information Management, 45, 262-275. Kelly, D., Glavin, F. G., & Barrett, E. (2021). Denial of wallet—defining a looming threat to serverless computing. Journal of Information Security and Applications, 60, 102843. Khalil, I., Khreishah, A., & Azeem, M. (2014). Consolidated Identity Management System for secure mobile cloud computing. Computer Networks, 65, 99-110. Khan, A. W., Khan, M. U., Khan, J. A., Ahmad, A., Khan, K., Zamir, M., Kim, W., & Ijaz, M. F. (2021). Analyzing and evaluating critical challenges and practices for software vendor organizations to secure big data on cloud computing: An AHP-based systematic approach. IEEE Access, 9, 107309-107332. Khan, A. W., Khan, M. U., Khan, J. A., Khan, J., & Gul, W. (2021). Identification and prioritization of security challenges of big data on cloud computing based on SLR: A fuzzy‐TOPSIS analysis approach. Journal of Software: Evolution and Process, 33(12), e2387. Khan, S. U., & Ullah, N. (2016). Challenges in the adoption of hybrid cloud: An exploratory study using systematic literature review. The Journal of Engineering, 2016(5), 107-118. Khorsandroo, S., Sánchez, A. G., Tosun, A. S., Arco, J. M., & Doriguzzi-Corin, R. (2021). Hybrid SDN evolution: A comprehensive survey of the state-of-the-art. Computer Networks, 192, 107981. Kitchenham, B., Madeyski, L., & Brereton, P. (2020). Meta-analysis for families of experiments in software engineering: A systematic review and reproducibility and validity assessment. Empirical Software Engineering, 25, 353-401. Kumar, P., & Alphonse, P. J. A. (2018). Attribute based encryption in cloud computing: A survey, gap analysis, and future directions. Journal of Network and Computer Applications, 108, 37-52. Lata, S., & Singh, D. (2022). Intrusion detection system in cloud environment: Literature survey & future research directions. International Journal of Information Management Data Insights, 2(2), 100134. Latif, R., Abbas, H., Assar, S., & Ali, Q. (2014). Cloud computing risk assessment: A systematic literature review. Future Information Technology: FutureTech 2013, 285-295. Lei, C., Dai, H., Yu, Z., & Li, R. (2020). A service recommendation algorithm with the transfer learning based matrix factorization to improve cloud security. Information Sciences, 513, 98-111. Li, J., Wu, J., Jiang, G., & Srikanthan, T. (2020). Blockchain-based public auditing for big data in cloud storage. Information Processing & Management, 57(6), 102382. Lin, C., Shen, Z., Chen, Q., & Sheldon, F. T. (2017). A data integrity verification scheme in mobile cloud computing. Journal of Network and Computer Applications, 77, 146-151. Liu, Z., Chen, X., Yang, J., Jia, C., & You, I. (2016). New order preserving encryption model for outsourced databases in cloud environments. Journal of Network and Computer Applications, 59, 198-207. Liu, Z., Xu, B., Cheng, B., Hu, X., & Darbandi, M. (2022). Intrusion detection systems in the cloud computing: A comprehensive and deep literature review. Concurrency and Computation: Practice and Experience, 34(4), e6646. Lopez, J., & Rubio, J. E. (2018). Access control for cyber-physical systems interconnected to the cloud. Computer Networks, 134, 46-54. Maček, D., Magdalenić, I., & Ređep, N. B. (2020). A systematic literature review on the application of multicriteria decision making methods for information security risk assessment. International Journal of Safety and Security Engineering, 10(2), 161-174. Mamdouh, M., Awad, A. I., Khalaf, A. A., & Hamed, H. F. (2021). Authentication and identity management of IoHT devices: achievements, challenges, and future directions. Computers & Security, 111, 102491. Memon, J., Sami, M., Khan, R. A., & Uddin, M. (2020). Handwritten optical character recognition (OCR): A comprehensive systematic literature review (SLR). IEEE Access, 8, 142642-142668. Miao, M., Jiang, T., & You, I. (2015). Payment-based incentive mechanism for secure cloud deduplication. International Journal of Information Management, 35(3), 379-386. Mikhaeil, C. A., & James, T. L. (2023). Examining the case of French hesitancy toward IDaaS solutions: Technical and social contextual factors of the organizational IDaaS privacy calculus. Information & Management, 60(4), 103779. Mishra, A., Alzoubi, Y. I., Anwar, M. J., & Gill, A. Q. (2022). Attributes impacting cybersecurity policy development: An evidence from seven nations. Computers & Security, 120, 102820. Mishra, P., Pilli, E. S., Varadharajan, V., & Tupakula, U. (2017). Intrusion detection techniques in cloud environment: A survey. Journal of Network and Computer Applications, 77, 18-47. Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., & Rajarajan, M. (2013). A survey of intrusion detection techniques in cloud. Journal of Network and Computer Applications, 36(1), 42-57. Noor, T. H., Zeadally, S., Alfazi, A., & Sheng, Q. Z. (2018). Mobile cloud computing: Challenges and future research directions. Journal of Network and Computer Applications, 115, 70-85. Pasupuleti, S. K., Ramalingam, S., & Buyya, R. (2016). An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. Journal of Network and Computer Applications, 64, 12-22. Pavithran, D., Al-Karaki, J. N., & Shaalan, K. (2021). Edge-based blockchain architecture for event-driven IoT using hierarchical identity based encryption. Information Processing & Management, 58(3), 102528. Rabaninejad, R., Attari, M. A., Asaar, M. R., & Aref, M. R. (2019). Comments on a lightweight cloud auditing scheme: Security analysis and improvement. Journal of Network and Computer Applications, 139, 49-56. Rabbani, M., Wang, Y. L., Khoshkangini, R., Jelodar, H., Zhao, R., & Hu, P. (2020). A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing. Journal of Network and Computer Applications, 151, 102507. Rai, R., Sahoo, G., & Mehfuz, S. (2015). Exploring the factors influencing the cloud computing adoption: A systematic study on cloud migration. SpringerPlus, 4, 1-12. Ramachandran, M. (2016). Software security requirements management as an emerging cloud computing service. International Journal of Information Management, 36(4), 580-590. Ramachandran, M., & Chang, V. (2016). Towards performance evaluation of cloud service providers for cloud data security. International Journal of Information Management, 36(4), 618-625. Rasheed, H. (2014). Data and infrastructure security auditing in cloud computing environments. International Journal of Information Management, 34(3), 364-368. Rebollo, O., Mellado, D., Fernández-Medina, E., & Mouratidis, H. (2015). Empirical evaluation of a cloud computing information security governance framework. Information and Software Technology, 58, 44-57. Ren, H., Ye, Z., & Li, Z. (2017). Anomaly detection based on a dynamic Markov model. Information Sciences, 411, 52-65. Rosado, D. G., Santos-Olmo, A., Sánchez, L. E., Serrano, M. A., Blanco, C., Mouratidis, H., & Fernández-Medina, E. (2022). Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern. Computers in Industry, 142, 103715. Sáez-de-Cámara, X., Flores, J. L., Arellano, C., Urbieta, A., & Zurutuza, U. (2023). Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks. Computers & Security, 131, 103299. Sabur, A., Chowdhary, A., Huang, D., & Alshamrani, A. (2022). Toward scalable graph-based security analysis for cloud networks. Computer Networks, 206, 108795. Safi, Q. G. K., Luo, S., Wei, C., Pan, L., & Chen, Q. (2017). PIaaS: Cloud-oriented secure and privacy-conscious parking information as a service using VANETs. Computer Networks, 124, 33-45. Samanthula, B. K., Elmehdwi, Y., Howser, G., & Madria, S. (2015). A secure data sharing and query processing framework via federation of cloud computing. Information Systems, 48, 196-212. Sarosh, P., Parah, S. A., Bhat, G. M., & Muhammad, K. (2021). A security management framework for big data in smart healthcare. Big Data Research, 25, 100225. Sheikh, A., Munro, M., & Budgen, D. (2019). Systematic literature review (SLR) of resource scheduling and security in cloud computing. International Journal of Advanced Computer Science and Applications, 10(4). Shen, H., Zhang, M., Wang, H., Guo, F., & Susilo, W. (2021). A cloud-aided privacy-preserving multi-dimensional data comparison protocol. Information Sciences, 545, 739-752. Showail, A., Tahir, R., Zaffar, M. F., Noor, M. H., & Al-Khatib, M. (2022). An internet of secure and private things: A service-oriented architecture. Computers & Security, 120, 102776. Shreyas, S. (2023). Security model for cloud computing: Case report of organizational vulnerability. Journal of Information Security, 14(4), 250-263. Singh, S. K., Lee, C., & Park, J. H. (2022). CoVAC: A P2P smart contract-based intelligent smart city architecture for vaccine manufacturing. Computers & Industrial Engineering, 166, 107967. Soewito, B., Gaol, F. L., & Abdurachman, E. (2022). A systematic literature review: Risk analysis in cloud migration. Journal of King Saud University-Computer and Information Sciences, 34(6), 3111-3120. Sohaib, O., Naderpour, M., Hussain, W., & Martinez, L. (2019). Cloud computing model selection for e-commerce enterprises using a new 2-tuple fuzzy linguistic decision-making method. Computers & Industrial Engineering, 132, 47-58. Sookhak, M., Talebian, H., Ahmed, E., Gani, A., & Khan, M. K. (2014). A review on remote data auditing in single cloud server: Taxonomy and open issues. Journal of Network and Computer Applications, 43, 121-141. Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215-225. Suomalainen, J., Julku, J., Heikkinen, A., Rantala, S. J., & Yastrebova, A. (2022). Security-driven prioritization for tactical mobile networks. Journal of Information Security and Applications, 67, 103198. Sun, P. (2020). Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and Computer Applications, 160, 102642. Tang, L., He, M., Xiong, L., Xiong, N., & Luo, Q. (2023). An efficient and privacy-preserving query scheme in intelligent transportation systems. Information Sciences, 647, 119448. Tian, D., Ying, Q., Jia, X., Ma, R., Hu, C., & Liu, W. (2021). MDCHD: A novel malware detection method in cloud using hardware trace and deep learning. Computer Networks, 198, 108394. Tian, H., Nan, F., Chang, C. C., Huang, Y., Lu, J., & Du, Y. (2019). Privacy-preserving public auditing for secure data storage in fog-to-cloud computing. Journal of Network and Computer Applications, 127, 59-69. Tian, J., & Wang, H. (2021). A provably secure and public auditing protocol based on the bell triangle for cloud data. Computer Networks, 195, 108223. Tu, S., Waqas, M., Huang, F., Abbas, G., & Abbas, Z. H. (2021). A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing. Computer Networks, 195, 108196. Veiga, A. D., & Eloff, J. H. (2007). An information security governance framework. Information Systems Management, 24(4), 361-372. Villalón-Fonseca, R. (2022). The nature of security: A conceptual framework for integral-comprehensive modeling of IT security and cybersecurity. Computers & Security, 120, 102805. Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of cloud computing and software-defined networking. Computer Networks, 81, 308-319. Wang, F., Zhu, H., Lu, R., Zheng, Y., & Li, H. (2021). A privacy-preserving and non-interactive federated learning scheme for regression training with gradient descent. Information Sciences, 552, 183-200. Wang, N., Liang, H., Jia, Y., Ge, S., Xue, Y., & Wang, Z. (2016). Cloud computing research in the IS discipline: A citation/co-citation analysis. Decision Support Systems, 86, 35-47. Wang, Z., Wang, N., Su, X., & Ge, S. (2020). An empirical study on business analytics affordances enhancing the management of cloud computing data security. International Journal of Information Management, 50, 387-394. Waqar, A., Raza, A., Abbas, H., & Khan, M. K. (2013). A framework for preservation of cloud users’ data privacy using dynamic reconstruction of metadata. Journal of Network and Computer Applications, 36(1), 235-248. Xiong, W., Hu, H., Xiong, N., Yang, L. T., Peng, W. C., Wang, X., & Qu, Y. (2014). Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications. Information Sciences, 258, 403-415. Yan, H., Chen, M., Hu, L., & Jia, C. (2020). Secure video retrieval using image query on an untrusted cloud. Applied Soft Computing, 97, 106782. Yang, H., Feng, T., & Yan, Y. (2022). Implementing efficient attribute encryption in IoV under cloud environments. Computer Networks, 218, 109363. Yang, J., Zhu, H., & Liu, T. (2019). Secure and economical multi-cloud storage policy with NSGA-II-C. Applied Soft Computing, 83, 105649. Yang, L., Han, Z., Huang, Z., & Ma, J. (2018). A remotely keyed file encryption scheme under mobile cloud computing. Journal of Network and Computer Applications, 106, 90-99. Younas, M., Jawawi, D. N., Ghani, I., Fries, T., & Kazmi, R. (2018). Agile development in the cloud computing environment: A systematic review. Information and Software Technology, 103, 142-158. Younis, Y. A., Kifayat, K., & Merabti, M. (2014). An access control model for cloud computing. Journal of Information Security and Applications, 19(1), 45-60. Zhang, G., Yang, Z., Xie, H., & Liu, W. (2021). A secure authorized deduplication scheme for cloud data based on blockchain. Information Processing & Management, 58(3), 102510. Zhang, J., Li, Z., Wang, B., Wang, X. A., & Ogiela, U. (2020). Enhanced certificateless auditing protocols for cloud data management and transformative computation. Information Processing & Management, 57(6), 102287. Zhang, J., Yang, Y., Chen, Y., Chen, J., & Zhang, Q. (2017). A general framework to design secure cloud storage protocol using homomorphic encryption scheme. Computer Networks, 129, 37-50. Zhang, M., Yang, M., Shen, G., Xia, Z., & Wang, Y. (2023). A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things. Information Sciences, 623, 293-310. Zhao, F., Peng, C., Xu, D., Liu, Y., Niu, K., & Tang, H. (2023). Attribute-based multi-user Zhao, K., Wang, X. A., Yang, B., Tian, Y., & Zhang, J. (2022). A privacy preserving homomorphic computing toolkit for predictive computation. Information Processing & Management, 59(2), 102880. Zhao, Q., Chen, S., Liu, Z., Baker, T., & Zhang, Y. (2020). Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. Information Processing & Management, 57(6), 102355. Zhu, H., & Gehrmann, C. (2021). Lic-Sec: an enhanced AppArmor Docker security profile generator. Journal of Information Security and Applications, 61, 102924. |
| 論文全文使用權限 |
如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信