OTP, digital certificate, and biometric verification;
Rain-6 and digital signature.
| Giri S [ ] | 2019 | Nepal | Cloud security challenges and solutions | Data access and confidentiality | Data encryption and classification |
| Al-Issa Y [ ] | 2019 | Jordan | Security challenges in eHealth cloud computing | Confidentiality, integrity, availability, ownership, and privacy of healthcare information; Authenticity, non-repudiation, audit, access control, data remanence and freshness, anonymity, unlinkability cloud multitenancy, secure transmission | HIPAA, HITECH ISO/IEC 27000-Series EU General Data Protection Regulation (GDPR) Patient-Centric Approach, Encryption Techniques |
| Bazm MM [ ] | 2019 | France | Virtualization layer isolation challenges | Memory deduplication; large-page memory management, non-privileged access to hardware instructions. | Detection, countermeasure, application-level, OS-level, hypervisor-level, hardware-level, and moving target defense approaches |
| Modi KJ [ ] | 2019 | India | Cloud security challenges and solutions | Security of data is a major factor, which restricts the acceptance of the cloud-based model. | Using linear network coding and re-encryption based on ElGamal cryptography in the form of a hybrid approach to secure healthcare information over the cloud; Linear network coding mechanism. |
| Kumar PR [ ] | 2018 | Brunei | Cloud security challenges and solutions | Confidentiality, integrity, availability, authentication, authorization, non-repudiation | Creating the data, classifying the data, identifying the sensitive data, defining policies, and creating access methods for different data types; Creating policies for archiving and destroying data; Storing data with proper physical and logical security protection, including backup and recovery plan; Identifying which datatype can be shared, with whom and how it can be shared; defining data sharing policies; In cloud computing, many such policies are collectively called as Service Level Agreements (SLA); Creating a corrective action plan in case data is corrupted or hacked due to network or communication devices; security flaws while data is in transit; Data encryption; Using data duplication, redundancy, backups, and resilient systems to address availability issues. |
| Basu S [ ] | 2018 | India | Security challenges in cloud computing | Confidentiality, integrity, availability | -- |
| Pinheiro A [ ] | 2018 | Brazil | Security architecture and protocol for trust verifications concerning the integrity of stored files in cloud services | Organizing a cloud storage service (CSS) that is safe from the client point of view, implementing CSS in public clouds, integrity, availability, privacy, and trust for the adopting cloud storage service | |
| Subramanian N [ ] | 2018 | India | Security challenges in cloud computing | Cloud computing threats and risks, security in crypto-cloud | Infrastructure-as-a-Service, Platform-as-a-Service, Software-as-a-Service, Testing-as-a-Service, Security-as-a-Service, Database-as-a-Service |
| Stergiou C [ ] | 2018 | Greece | Security, privacy, and efficiency of sustainable cloud computing for big data and IoT | The security and privacy | Installing a security "wall" between the cloud server and the Internet |
| Abrar H [ ] | 2018 | Pakistan | Risk analysis of cloud sourcing in healthcare and public health industry | Data breaches, data loss, account hijacking, insecure interfaces and APIs, denial-of-service attacks (dos), malicious insiders, abuse of cloud resources, insufficient due diligence, shared technology issues | Likelihood determination, impact analysis, risk determination |
| Esposito C [ ] | 2018 | Italy | Cloud security challenges and solutions | Confidentiality, privacy | Data encryption, blockchain |
| Huang Q [ ] | 2018 | China | Data security challenges and solutions | Confidentiality, availability | Data encryption, public-key encryption, identity-based encryption, identity-based broadcast encryption, attribute-based encryption |
| Roy S [ ] | 2018 | India | Cloud security challenges and solutions | The authentication process and security | A combined approach of fine-grained access control over cloud-based multi-server data along with a provably secure mobile user authentication mechanism for the Healthcare Industry 4.0. |
| Al-Shqeerat KH [ ] | 2017 | Saudi Arabia | Security challenges in cloud computing | Network security, access control, cloud infrastructure, data security | Educating the stakeholders adequately on the cloud; Making sure that the IT administrator is able to control and manage cloud items and services when concluding the contract agreement with the service provider; An agreement with a third party to perform audits regularly to monitor the performance and compliance of the service provider to the agreed terms; Monitoring the performance of available cloud services and resources periodically; Data and applications in the cloud environment must be classified based on their values (according to their importance and sensitivity); not all data stored in the cloud are rated as top secure data; Backup and recovery; Proper authentication, authorization, and access security tools and mechanisms; Providing suite strong encryption protocols and key management for data at rest, in transit, and on the backup state |
| Barona R [ ] | 2017 | India | Security challenges in cloud computing | Data breach, account or service traffic hijacking, insecure interfaces and Application Programming Interfaces (APIs), denial-of-Service (DOS), malicious insiders, abuse of cloud services, shared technology vulnerabilities | Information-centric security,high-assurance remote server attestation privacy-enhanced business intelligence, privacy and data protection, homomorphic encryption Searchable/ structured encryption, proofs of storage, server aided secure computation |
| Bhushan K [ ] | 2017 | India | Security challenges in cloud computing | Physical level security issues, application and software-related security issues, network-related security issues, data-related security issues, computation-related issues, hardware virtualization-related issues, management and account control-related issues, trust-related issues, compliance and law-related issues | Classification based on the type technique used, classification based on the attack detection principle, classification based on reaction time, classification based on deployment point, classification based on the degree of deployment, classification based on the degree of cooperation, classification based on the defense activity, classification based on response strategy |
| Park J [ ] | 2017 | Korea | Blockchain security in cloud computing | adapting blockchain security computing and its secure solutions | Blockchain provides security through the authentication of peers that share virtual cash, encryption, and generation of the hash value |
| Radwan T [ ] | 2017 | Egypt | Cloud computing security | Privileged access, Data location; Availability, Investigation support; Regulatory compliance, Data segregation; Recovery, Long-term viability. | Authentication, authorization |
| Singh A [ ] | 2017 | India | Cloud security issues | Zombie attack (DoS/DDoS attack); Service injection attack; Attack on virtualization/hypervisor; User to root attacks; Port scanning; Man-in-middle attack; Metadata spoofing attack; Phishing attack; Backdoor channel attack. | Strong authentication and authorization; Strong isolation mechanisms between VMs; Using the hash function to check service integrity; web service security; Adopting secure web browsers and API; Using a strong password; better authentication mechanism; Requiring strong port security, Requiring a proper Secure Socket Layer (SSL) architecture; Service functionality and other details should be kept in encrypted form to access the file required a strong authentication mechanism; Using a secure web link (HTTPS); Requiring strong authentication, authentication, and isolation mechanisms. |
| Mohit P [ ] | 2017 | India | Cloud security challenges and solutions | Security protection is important for medical records (data) of the patients because of very sensitive information. Patient anonymity. | Authentication protocol for TMIS using the concept of cloud environment |
| Hussein NH [ ] | 2016 | Sudan | Cloud security challenges and solutions | Authentication and authorization; Data confidentiality; Availability; Information security; Data access; Data breaches. | Logical network segmentation; Firewalls implementing; Traffic encryption; Network monitoring; |
| Kaur M [ ] | 2016 | India | Cloud security challenges and solutions | Confidentiality; Authentication; Integrity; Non-repudiation; Availability | Data classification; Data Encryption |
| Muthurajan V [ ] | 2016 | India | An elliptic curve-based Schnorrcloud security model in a distributed environment | The security upgrade in data transmission Approaches | A virtual machine-based cloud model with Hybrid Cloud Security Algorithm (HCSA); The combination of Elliptic Curve-based Schnorr (EC-Schnorr) scheme and blooming filter; A virtual machine-based cloud model with Hybrid Cloud Security Algorithm (HCSA); The optimization in the computational steps by ECC signature set and the duplication removal by blooming filter in the proposed Hybrid Cloud Security Algorithm (HCSA) |
| Prakash C [ ] | 2016 | India | Cloud computing security | Deployment model issue, service model issues, network issues | Categorization of the data according to the risk associated with the data; Service Level Agreement (SLA); isolation amongst the resources by using segmentation; development of the dedicated application; a strong two-factor authentication |
| Vurukonda N [ ] | 2016 | India | Privacy and confidentiality in the cloud environment | Data privacy and integrity, improper media sanitization, data recovery and vulnerability, data backup, service level agreements malicious insider, outside intruder, legal issues, confidentiality | SecCloud, for securing cloud data; FADE, a protocol for data privacy and integrity; TimePRE, a scheme for secure data sharing in the cloud; a methodology for security of resident data SPICE, identity management framework;role-based access control scheme, identity management framework |
| Alasmari S [ ] | 2016 | USA | Security and privacy, challenges in IoT-based health cloud | Managing credentials and controlling access to applications and patient's confidential information, implementing and deploying cryptographic protocols in IoT health cloud correctly, mitigating device vulnerabilities and deploying firmware patches, securing IoT health networks and minimizing the risk of data loss | |
| Albuquerque SL [ ] | 2016 | Brazil | Security in cloud-computing-based mobile health | Personal equipment vulnerabilities, assurance of cloud computing service availability assurance of confidentiality and integrity in unreliable cloud environments, access control and authenticity guarantee of systems users | |
| Casola V [ ] | 2016 | Italy | Healthcare-related data in the cloud: challenges and opportunities | Having a decentralized and distributed design, allowing asynchronous interactions, supporting security mechanisms concerning privacy regulations, providing flexible data and service integration | Cryptographic solutions, such as privacy-preserving cloud ones |
| EL Bouchti A [ ] | 2016 | Morocco | Cloud security challenges and solutions | Confidentiality, availability, data portability | Data encryption |
| Dorairaj SD [ ] | 2015 | India | Cloud security challenges and solutions | Confidentiality, auditability | Access control, data encryption, integrity verification, log analysis, data classification |
| Kene SG [ ] | 2015 | India | Cloud security challenges and solutions | Confidentiality, integrity availability | Hybrid detection technique, network intrusion detection system (NIDS) |
| Liu Y [ ] | 2015 | USA | Cloud security challenges and solutions | Loss of control, lack of transparency, multi-tenancy | Data encryption, access control |
| Ali M [ ] | 2015 | USA | Security challenges in cloud computing | Communication, architectural contractual and legal mobile application security, authentication, user privacy, data security | Using virtual LANs, IPS, IDS, and firewalls as a combination to protect the data in transit; Using off-the-shelf technology; Using standard algorithms; The implementers should secure each virtualized OS in each guest VM; The VMs at rest should be encrypted; Third-party security technology should be applied to decrease dependency on the CSP; VM images at rest should be patched with the latest fixes as soon as required; Security's vulnerability assessment tools should cover the virtualized environment; Virtualization-aware security tools should be implemented and used in the cloud computing environment; The protection mechanism should be in place until VMs are patched. The risk and attack models should be continuously built and maintained; Regular penetration testing for web applications should be carried out; The secure software lifecycle and software architecture should be developed and maintained; The source of the attributes should be as close to the master one as possible; Open standard federations, such as SAML and OAuth, should be preferred if possible; Bi-directional trust should be ensured for secure relationship and transactions. |
| Anand P [ ] | 2015 | USA | Security challenges in cloud computing | Traffic hijacking, data breaches, data loss, insecure APIs, denial-of-Service, abuse of cloud services, malicious insiders, shared technology issues | -- |
| Rao RV [ ] | 2015 | India | Data security challenges in cloud computing | Integrity, confidentiality breaches, segregation, storage, data center operation | Encryption, RSA signature,identity-based cryptography, data security RSA-based storage security technique, distributed access control architecture |
| Wang B [ ] | 2015 | USA | DDoS attack protection | Network security | The SDN-based network management, DaMask |
| Wang Y [ ] | 2015 | Japan | Fog computing: security and forensics | Trust issue due to dependency on CSP, preserving the integrity, decentralization of logs, absence of critical information in logs, logs in multiple tiers and layers, volatility of logs, dependency on CSP for logs, dependability on CSP for data acquisition, trust issues of cloud computing, multi-tenancy, the chain of custody | API provided by CSP for logs, the cloud management plan, robust SLA, global unity, virtual machine introspection, the trusted third party, continuous synchronization, TPM, data provenance in the cloud, isolating a cloud instance |
| Moosavi SR [ ] | 2015 | Finland | Cloud security challenges and solutions | End-to-end security for healthcare IoT | Session resumption-based end-to-end security scheme for healthcare Internet of things (IoT), The projected scheme is realized by using a certificate-based DTLS handshake between end-users and smart gateways, besides applying the DTLS session resumption method. |
| Zhang K [ ] | 2015 | USA | Cloud security challenges and solutions | Security and privacy | Privacy-preserving health data aggregation, secure health data access and processing, misbehavior detection for the health-oriented mobile social network application |
| Zhou J [ ] | 2015 | China | Cloud security challenges and solutions | E-healthcare cloud computing systems | Traceable and revocable multi-authority attribute-based encryption named TR-MABE to achieve efficiently multi-level privacy preservation without introducing other special signatures, secret keys used to protect patient's identity and PHI |
| Khattak HAK [ ] | 2015 | Pakistan | Security concerns of cloud-based healthcare systems | Confidentiality, integrity, availability, privacy | Access control, multi-cloud computing security |
Although cloud computing, as a novel technology, provides patient data availability all across, it encounters critical challenges in meeting one of the health industry's most significant demands. In cloud computing, providing security systems is necessary due to its inherent features, such as remote data storage, lack of network environment, proliferation, and massive infrastructure sharing [ 69 ]. Therefore, accurate identification of security challenges and their appropriate solutions is essential for both cloud computing providers and organizations using this technology [ 62 ].
Recently, artificial intelligence (AI) has shown a promising bright future in medical issues, especially when combined with cloud computing. Ahmed Sedik et al. have used AI deep learning to create a tool for quick screening of COVID-19 patients from their chest X-rays. This modality can be performed through a cloud-based system anywhere radiography equipment is found [ 70 ].
Identification systems also can use cloud computing. Alsmirat et al. have shown that digital cameras can act as a fingerprint identification system with an image compression rate of 30–40%, widely available on smartphones. Data security is a significant challenge there as well [ 71 ].
The present study indicates that the most vital challenge in cloud computing technology is maintaining data security. Malicious or negligent individuals may threaten data security. Several solutions provide data security, the most important of which is data encryption [ 20 , 25 , 29 ]. Data encryption is an essential line of protection in cybersecurity architecture. Encryption makes interrupted data use as difficult as possible [ 27 , 28 , 32 ]. Furthermore, data encryption is used to develop an encryption scheme that hypothetically can merely be broken with large amounts of computing potency [ 41 , 42 , 44 , 49 ]. Kaur et al. [ 49 ] and Dorairaj et al. [ 57 ] have stated data encryption as a strategy to protect data against security threats. The results of the current research further show data encryption as the best solution to provide data security.
Many methods have been proposed for data encryption. A four-image encryption scheme has been proposed by Yu et al. based on the computer-generated hologram, quaternion fresnel transforms (QFST), and two-dimensional (2D) logistic-adjusted-sine map (LASM). This innovative technology considerably decreases the key data sent to the receiver for decryption, making it more promising to be stored and transmitted [ 72 ]. In order to secure cloud data storage and its delivery to authorized users, a hierarchal identity-based cryptography method has been proposed by Kaushik et al. to assure that a malicious attacker or CSP does not change for its benefit [ 73 ].
Another research has proposed a method to avoid always using the upstream communication channel from the clients to the cloud server via an optimistic concurrency control protocol, which reduces communication delay for IoT users. Only update transactions are sent to the cloud using this method, and they are only partially validated at the fog node [ 74 ].
According to the present research results, confidentiality is the second most important challenge in cloud technology. It refers to the protection of data from being obtained by unauthorized individuals; in other words, sensitive information is only accessible by authorized persons [ 75 ]. Cloud data control can result in an increased risk of data compromise. To ensure that the patient-doctor relationship runs smoothly, patients must have faith in the healthcare system to keep their data private [ 17 ]. Studies have shown that confidentiality may be achieved by access control [ 52 , 62 ] and authentication [ 45 , 76 ]. A Mutual Authentication and Secret Key (MASK) establishment protocol has been presented by Masud et al. in the field of the Internet of Medical Things (IoMT) in COVID-19 patients. The proposed protocol uses Physical Unclonable Functions (PUF) to enable the network devices to validate the doctor legitimacy (user) and sensor node before establishing a session key. Therefore, it addresses the confidentiality, authentication, and integrity problems and secures the sensitive health information of the patients [ 77 ].
This research shows that integrity, availability, and network security are important issues in the cloud computing infrastructure. A developmental study has mentioned integrity and availability as challenging problems in implementing cloud-based services, especially when losing or leaking information could result in major legal- or business-related damage [ 34 ]. Confidentiality, Integrity, and Availability (CIA) have been reported as the main three factors in cloud system security, which are considered here for the evaluation [ 33 ].
The number of network security challenges has rapidly increased with the advent of wireless sensor networks [ 22 , 24 ]. Therefore, network security in cloud infrastructure has become a challenge for organizations [ 41 , 43 ]. The common network attacks have happened at the network layer, including IP spoofing, port scanning, man-in-middle attack, address resolution protocol (ARP) spoofing, routing information protocol (RIP) attack, denial of service (DoS), and distributed denial of service (DDoS) [ 58 ]. The attackers, for instance, can send a considerable number of requests in order to access virtual machines in cloud computing to restrict their availability to valid users; this is termed the DoS attack. The availability of cloud resources is targeted by this attack [ 63 ]. The related studies have shown that no specific security standard exists for security controls in wireless networks [ 24 , 51 , 63 ]. However, in order to keep security in cloud computing networks, potential solutions, including Application Programming Interfaces (API), data classification, and security management protocol, could be applied [ 60 , 64 , 78 , 79 ].
Limitations
Due to the nature of the solution protocols, we could not explain their details. We aimed to clarify the present challenges and possible solutions to help others address and work on the issues, thus skipping some details and protocols presented for solutions. We only reviewed the English studies, thus possibly missing some reports.
Cloud computing offers various benefits in data access and storage, particularly to healthcare organizations and relevant studies. Although the cloud computing environment is considered as a potential Internet-based computing platform, the security concerns encountered are notable. Security concerns may occur as a result of the cloud computing paradigm's shared, virtualized, and public nature. Overcoming these challenges by developing novel solutions is the only option for cloud computing adoption. All users, individuals or organizations, should be well informed of the security risks in the cloud.
In this study, an overview of cloud computing is presented; also, its security challenges and solutions surfaced within the past five years are reviewed. In order to offer safe data access, data encryption can be utilized to store and retrieve data from the cloud. We have also gone through some of the major challenges that make cloud security engineering tough. Identifying these challenges is the first step to tackle them, and future studies need to provide more feasible solutions to fix such bugs.
Acknowledgments
The present study was extracted from the research project with the IR.KHALUMS.REC.1400.001 code entitled "Investigating the necessary infrastructure for implementing cloud computing technology in Khalkhal University of Medical Sciences" conducted at the Khalkhal University of Medical Sciences in 2021.
Conflict of interest
The authors declare that there is no conflict of interest.
We apologize for the inconvenience...
To ensure we keep this website safe, please can you confirm you are a human by ticking the box below.
If you are unable to complete the above request please contact us using the below link, providing a screenshot of your experience.
https://ioppublishing.org/contacts/
HE-AO: An Optimization-Based Encryption Approach for Data Delivery Model in A Multi-Tenant Environment
- Published: 17 September 2024
Cite this article
- Pawan Kumar 1 &
- Ashutosh Kumar Bhatt 2
Recently, cloud computing has become a growing technology in the information technology industry because of its several smooth delivery services. In cloud computing, multi-tenancy is one of the primary features that affords economic and scalability significance to the service providers and end-users by distributing a similar cloud platform. Due to the increasing demand for cloud computing, cloud usage has increased, so various vulnerabilities and threats have also been enhanced. Hence, data security and privacy are considered the major issues of multi-tenant environments in the cloud. Several existing studies have developed different mechanisms to solve security issues in multi-tenant cloud environments. However, they faced various problems while improving security, and this led to a lack of confidentiality, authenticity, and data integrity. Thus, this research paper intends to propose an efficient encryption approach for securing data delivery in the cloud with reduced time. For secure data delivery, homomorphic encryption is utilized to encode the cloud server’s data. In homomorphic encryption, four stages are available for data delivery: key generation, encryption, decryption, and evaluation. The main problems in this homomorphic encryption mechanism are key sharing and key management. Due to these problems, the performance of homomorphic encryption is diminished. Thus, the proposed work introduces an Aquila optimizer for the key generation process. In this, optimal keys are selected, and it provides improved data security and privacy for cloud users. Finally, the selected keys are generated for the encryption and decryption process. The efficiency of the proposed approach is proved by comparing the performance in terms of encryption time, decryption time and throughput over the existing schemes like Rivest, Shamir and Adleman, ElGamal, Algebra Homomorphic Encryption scheme based on ElGamal (AHEE) and modified AHEE. The experimental results reveal that the proposed model achieves reduced encryption and decryption time of 972 ms and 4261 ms for the data size ranges from 5 to 25 mb.
This is a preview of subscription content, log in via an institution to check access.
Access this article
Subscribe and save.
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Price includes VAT (Russian Federation)
Instant access to the full article PDF.
Rent this article via DeepDyve
Institutional subscriptions
Explore related subjects
Data Availability
No data Availability.
Guo, Y., Ganti, S., & Wu, Y. (2024). Enhancing energy efficiency in telehealth internet of things systems through fog and cloud computing integration: simulation study. JMIR biomedical engineering, 9 (1), e50175.
Google Scholar
Venkatachalam, N., Shanmugam, L., Parkavi, K., & Satheeswari, D. (2024). IoT Next gen and the world of big data computing. In Big Data Computing (pp. 1–16). CRC Press.
Mahapatra, A., Mishra, K., Pradhan, R., & Majhi, S. K. (2024). Next generation task offloading techniques in evolving computing paradigms: Comparative analysis, current challenges, and future research perspectives. Archives of Computational Methods in Engineering, 31 (3), 1405–1474.
Chauhan, M., & Shiaeles, S. (2023). An analysis of cloud security frameworks, problems and proposed solutions. Network, 3 (3), 422–450.
Kim, J., & Kim, Y. (2016). Benefits of cloud computing adoption for smart grid security from security perspective. The Journal of Supercomputing, 72 , 3522–3534.
Battula, M. (2024). A systematic review on a multi-tenant database management system in cloud computing. In 2024 international conference on cognitive robotics and intelligent systems (ICC-ROBINS) , 890–897. IEEE.
Adeniyi, E. A., Ogundokun, R. O., Misra, S., Awotunde, J. B., & Abiodun, K. M. (2022). Enhanced security and privacy issue in multi-tenant environment of green computing using blockchain technology. In S. Misra & A. K. Tyagi (Eds.), Blockchain applications in the smart era (pp. 65–83). Cham: Springer International Publishing.
Kudari, R., Reddy, D. A., & Krishna, G. R. (2022). Collaborative Network Security for Virtual Machine in Cloud Computing for Multi-tenant Data Center. In: Machine Intelligence and Smart Systems: Proceedings of MISS 2021 , 341–349. Singapore: Springer Nature Singapore.
Deochake, S., & Channapattan, V. (2022). Identity and access management framework for multi-tenant resources in hybrid cloud computing. In Proceedings of the 17th International Conference on Availability, Reliability and Security , 1–8.
Bindu Madavi, K. P., Neelaveni, P., Rakesh, P., & Asish, S. (2024). Security and privacy issues in cloud and IoT technology and their countermeasures. In A. Prasad (Ed.), Communication technologies and security challenges in IoT: Present and future (pp. 107–129). Singapore: Springer Nature Singapore.
Ali, T., Al-Khalidi, M., & Al-Zaidi, R. (2024). Information security risk assessment methods in cloud computing: comprehensive review. Journal of Computer Information Systems . https://doi.org/10.1080/08874417.2024.2329985
Polkowski, Z., Nycz-Lukaszewska, M. (2020). Infrastructure as a service: Cloud computing model for micro companies. In Advances in Data Science and Management: Proceedings of ICDSM 2019 pp. 307–320. Springer Singapore, 2020.
Matarneh, A. J., AlTahat, S. S., Ali, O. A., & Jwaifel, I. (2019). The real intellectual impact of cloud accounting in achieving the competitive advantage in the jordanian industrial companies. International Journal of Science and Technology Research, 8 , 1763.
Manthiramoorthy, C., & Khan, K. M. S. (2024). Comparing several encrypted cloud storage platforms. International Journal of Mathematics, Statistics, and Computer Science, 2 , 44–62.
Ogiela, U. (2020). Cognitive cryptography for data security in cloud computing. Concurrency and Computation: Practice and Experience, 32 (18), e5557.
Wang, Z., Wang, N., Su, X., & Ge, S. (2020). An empirical study on business analytics affordances enhancing the management of cloud computing data security. International Journal of Information Management., 50 , 387–394.
Chinnasamy, P., Padmavathi, S., Swathy, R., Rakesh, S. (2021). Efficient Data Security Using Hybrid Cryptography on Cloud Computing. In Inventive Communication and Computational Technologies. Springer, Singapore 537–547.
Akyol, S. (2023). A new hybrid method based on Aquila optimizer and tangent search algorithm for global optimization. Journal of Ambient Intelligence and Humanized Computing, 14 (6), 8045–8065.
Nematollahi, M., Ghaffari, A., & Mirzaei, A. (2024). Task offloading in Internet of Things based on the improved multi-objective aquila optimizer. Signal, Image and Video Processing, 18 (1), 545–552.
Kumar, P., & Bhatt, A. K. (2020). Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach. IET Communications., 14 (18), 3212–3222.
Veerabathiran, V. K., Mani, D., Kuppusamy, S., Subramaniam, B., Velayutham, P., Sengan, S., & Krishnamoorthy, S. (2020). Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption. Soft Computing, 24 (24), 18893–18908.
Gupta, L.M., Garg, H., Samad, A. (2021). Secure group data sharing with an efficient key management without re-encryption scheme in cloud computing. In Proceedings of Second international conference on computing, communications, and cyber-security. Springer, Singapore 265–277.
Alabdulatif, A., Khalil, I., & Yi, X. (2020). Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption. Journal of Parallel and Distributed Computing, 137 , 192–204.
Sammeta, N., & Parthiban, L. (2021). Medical data analytics for secure multi-party-primarily based cloud computing utilizing homomorphic encryption. Journal of Scientific and Industrial Research (JSIR), 80 (08), 692–698.
Zhu, K., Wang, Z., Ding, D., Dong, H., & Xu, C. Z. (2024). Secure state estimation for artificial neural networks with unknown-but-bounded noises: a homomorphic encryption scheme. IEEE Transactions on Neural Networks and Learning Systems . https://doi.org/10.1109/TNNLS.2024.3389873
Vangujar, A. K., Ganesh, B., Umrani, A., & Palmieri, P. (2023). A novel approach to e-voting with group identity based identification and homomorphic encryption. Cryptology ePrint Archive .
Download references
No funding is provided for the preparation of the manuscript.
Author information
Authors and affiliations.
Uttarakhand Technical University, Dehradun, India
Pawan Kumar
School of Computer Sciences and Information Technology, Uou, Haldwani, India
Ashutosh Kumar Bhatt
You can also search for this author in PubMed Google Scholar
Contributions
All authors are equal contributions in this work.
Corresponding author
Correspondence to Pawan Kumar .
Ethics declarations
Conflict of interest.
Authors Mr. Pawan Kumar & Dr. Ashutosh Kumar Bhatt declares that they have no conflict of interest.
Ethical Approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Consent to Participate
All the authors involved have agreed to participate in this submitted article.
Consent to Publish
All the authors involved in this manuscript give full consent for publication of this submitted article.
Additional information
Publisher's note.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
Reprints and permissions
About this article
Kumar, P., Bhatt, A.K. HE-AO: An Optimization-Based Encryption Approach for Data Delivery Model in A Multi-Tenant Environment. Wireless Pers Commun (2024). https://doi.org/10.1007/s11277-024-11565-7
Download citation
Accepted : 02 September 2024
Published : 17 September 2024
DOI : https://doi.org/10.1007/s11277-024-11565-7
Share this article
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
- Cloud computing
- Key generation
- Homomorphic encryption
- Aquila optimization
- Optimal keys
- Find a journal
- Publish with us
- Track your research
IEEE Account
- Change Username/Password
- Update Address
Purchase Details
- Payment Options
- Order History
- View Purchased Documents
Profile Information
- Communications Preferences
- Profession and Education
- Technical Interests
- US & Canada: +1 800 678 4333
- Worldwide: +1 732 981 0060
- Contact & Support
- About IEEE Xplore
- Accessibility
- Terms of Use
- Nondiscrimination Policy
- Privacy & Opting Out of Cookies
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
Information
Initiatives
You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.
All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .
Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.
Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.
Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.
Original Submission Date Received: .
- Active Journals
- Find a Journal
- Journal Proposal
- Proceedings Series
- For Authors
- For Reviewers
- For Editors
- For Librarians
- For Publishers
- For Societies
- For Conference Organizers
- Open Access Policy
- Institutional Open Access Program
- Special Issues Guidelines
- Editorial Process
- Research and Publication Ethics
- Article Processing Charges
- Testimonials
- Preprints.org
- SciProfiles
- Encyclopedia
Article Menu
- Subscribe SciFeed
- Google Scholar
- on Google Scholar
- Table of Contents
Find support for a specific problem in the support section of our website.
Please let us know what you think of our products and services.
Visit our dedicated information section to learn more about MDPI.
JSmol Viewer
Edge computing in healthcare: innovations, opportunities, and challenges.
1. Introduction
- An overview of core concepts related to edge computing, highlighting characteristics, use cases, and challenges.
- The definition of a systematic review methodology based on PRISMA by defining a set of research questions and clear inclusion/exclusion criteria.
- An analysis and classification of the selected articles considering the most important research topics, the used techniques, identified gaps, and future research.
- A Strengths, Weaknesses, Opportunities, and Threats (SWOT) analysis for a better understanding of edge computing in healthcare research.
2. Edge Computing Overview
2.1. main characteristics.
- Proximity to data sources: Edge computing brings computation and data storage close to the location where data are generated, allowing real-time processing [ 2 , 14 , 15 ].
- Reduced latency: One of the most significant advantages of edge computing is its ability to offer low latency by processing data locally rather than sending them to centralized cloud data centers far from the data source. This is critical for delay-sensitive applications [ 3 , 4 , 6 ].
- Bandwidth reduction: Edge computing reduces the amount of data that must travel over the network, by employing data processing locally, thereby saving bandwidth and reducing network congestion [ 2 , 16 ].
- Enhanced security and privacy: Processing data locally on edge devices can enhance data security and privacy, as sensitive information does not need to traverse the internet to reach a centralized cloud server. With proper security protocols, data breaches or leaks can be mitigated [ 10 , 16 ].
- Mobility support: Due to the dynamic nature of edge locations and the devices connected within these networks, edge computing offers robust support for mobility, effectively handling the changing conditions and locations of devices [ 2 , 15 ].
- Location awareness: Edge computing systems are aware of their geographical location, which can be leveraged to deliver localized services such as content delivery, local resource sharing, and regional data processing [ 17 , 18 ].
- Heterogeneity: Edge computing can support a diverse range of devices, applications, and services through specific standards and data models [ 2 , 19 ].
2.2. Use Cases and Application Domains
- allows for real-time decisions and enables for immediate response from professionals.
- reduces the risk of data breaches by processing and storing personal information at the edge.
- bandwidth and cost reduction by transmitting only the mandatory information to centralized entities.
- allows AI model deployment closer to the patient, enables personalization of AI models, and the prediction of health issues based on real-time data from the monitoring devices.
2.3. Challenges
- Identify the main use cases of edge computing in healthcare.
- Examine the development of edge computing solutions in healthcare systems.
- Investigate the technical challenges in the edge computing integration into eHealth systems.
- Determine the future research directions and potential advancements in edge computing for improving healthcare technologies.
- Edge Computing Artificial Intelligence Healthcare
- Edge Computing and Ambient Intelligence
- Edge Computing and Personalized Care
- Edge Computing and Active Assisted Living
- Edge Computing and Ambient Assisted Living
- Edge Computing and Remote Care
- Edge Computing Data Privacy and Security Healthcare
4. Literature Review
4.1. privacy and security, 4.2. ai-based optimization in edge environments, 4.3. edge offloading and computational distribution.
Paper | Technologies Used | Main Contribution |
---|
[ ] | Blockchain | Architecture for secured decentralized system |
[ ] | Blockchain, NFTs | Ensure decentralized and secure resource allocation |
[ ] | JTOS | Reducing delays in critical IoT applications |
[ ] | SDN, NFV | Improved mobility management |
[ ] | SDN, NFV | Enhancing network flexibility |
[ ] | DL, PNN | Improving latency and resource use in fog computing |
[ ] | DL, CL | Enhancing real-time decision-making |
[ ] | FL, Blockchain | Improving latency and data privacy |
[ ] | FL, UAV | Collective data processing |
[ ] | Neuromorphic HW, DL | Enhancing accuracy and reducing power consumption |
[ ] | CNN, LogNNet | Neural Network designed for edge computing, fine-tuned for medical data analysis |
[ ] | SVM, ANFIS | Facilitate data processing across layers |
[ ] | MAS | Efficient handling of healthcare-related tasks |
[ ] | Real-time data processing pipelines | Improved efficiency in remote monitoring |
[ ] | Simulator Edge/Fog | Improving latency and data privacy |
[ ] | Wearable-based chemical sensing | Enhanced data processing and analysis techniques |
[ ] | DPSO | Optimizing task distribution |
[ ] | DAG, S2S, DCP | Collaborative and task placement optimization |
[ ] | SVM, DT | Reduce network layer overhead |
[ ] | FL, Personalization techniques | Adapt node to specific needs, enable heterogeneity |
5. Discussion
6. conclusions, author contributions, data availability statement, conflicts of interest.
- Wang, X.; Han, Y.; Leung, V.C.M.; Niyato, D.; Yan, X.; Chen, X. Convergence of Edge Computing and Deep Learning: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2020 , 22 , 869–904. [ Google Scholar ] [ CrossRef ]
- Khan, W.Z.; Ahmed, E.; Hakak, S.; Yaqoob, I.; Ahmed, A. Edge computing: A survey. Future Gener. Comput. Syst. 2019 , 97 , 219–235. [ Google Scholar ] [ CrossRef ]
- Yu, W.; Liang, F.; He, X.; Hatcher, W.G.; Lu, C.; Lin, J.; Yang, X. A Survey on the Edge Computing for the Internet of Things. IEEE Access 2018 , 6 , 6900–6919. [ Google Scholar ] [ CrossRef ]
- Chen, J.; Ran, X. Deep Learning with Edge Computing: A review. Proc. IEEE 2019 , 107 , 1655–1674. [ Google Scholar ] [ CrossRef ]
- Alahi, M.E.E.; Sukkuea, A.; Tina, F.W.; Nag, A.; Kurdthongmee, W.; Suwannarat, K.; Mukhopadhyay, S.C. Integration of IoT-Enabled Technologies and Artificial Intelligence (AI) for Smart City Scenario: Recent Advancements and Future Trends. Sensors 2023 , 23 , 5206. [ Google Scholar ] [ CrossRef ]
- Pan, J.; McElhannon, J. Future Edge Cloud and Edge Computing for Internet of Things Applications. IEEE Internet Things J. 2018 , 5 , 439–449. [ Google Scholar ] [ CrossRef ]
- Anghel, I.; Cioara, T.; Moldovan, D.; Antal, M.; Pop, C.D.; Salomie, I.; Pop, C.B.; Chifu, V.R. Smart Environments and Social Robots for Age-Friendly Integrated Care Services. Int. J. Environ. Res. Public Health 2020 , 17 , 3801. [ Google Scholar ] [ CrossRef ]
- Cicirelli, G.; Marani, R.; Petitti, A.; Milella, A.; D’Orazio, T. Ambient Assisted Living: A Review of Technologies, Methodologies and Future Perspectives for Healthy Aging of Population. Sensors 2021 , 21 , 3549. [ Google Scholar ] [ CrossRef ]
- Deng, S.; Zhao, H.; Fang, W.; Yin, J.; Dustdar, S.; Zomaya, A.Y. Edge Intelligence: The Confluence of Edge Computing and Artificial Intelligence. IEEE Internet Things J. 2020 , 7 , 7457–7469. [ Google Scholar ] [ CrossRef ]
- Ometov, A.; Molua, O.L.; Komarov, M.; Nurmi, J. A Survey of Security in Cloud, Edge, and Fog Computing. Sensors 2022 , 22 , 927. [ Google Scholar ] [ CrossRef ]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. BMJ 2021 , 372 , n71. [ Google Scholar ] [ CrossRef ] [ PubMed ]
- Arcas, G.I.; Cioara, T.; Anghel, I.; Lazea, D.; Hangan, A. Edge Offloading in Smart Grid. Smart Cities 2024 , 7 , 680–711. [ Google Scholar ] [ CrossRef ]
- Premsankar, G.; Di Francesco, M.; Taleb, T. Edge Computing for the Internet of Things: A Case Study. IEEE Internet Things J. 2018 , 5 , 1275–1284. [ Google Scholar ] [ CrossRef ]
- Zhou, Z.; Chen, X.; Li, E.; Zeng, L.; Luo, K.; Zhang, J. Edge Intelligence: Paving the Last Mile of Artificial Intelligence with Edge Computing. Proc. IEEE 2019 , 107 , 1738–1762. [ Google Scholar ] [ CrossRef ]
- Satyanarayanan, M. The Emergence of Edge Computing. Computer 2017 , 50 , 30–39. [ Google Scholar ] [ CrossRef ]
- Shi, W.; Cao, J.; Zhang, Q.; Li, Y.; Xu, L. Edge Computing: Vision and Challenges. IEEE Internet Things J. 2016 , 3 , 637–646. [ Google Scholar ] [ CrossRef ]
- Sun, X.; Ansari, N. EdgeIoT: Mobile Edge Computing for the Internet of Things. IEEE Commun. Mag. 2016 , 54 , 22–29. [ Google Scholar ] [ CrossRef ]
- Shi, W.; Dustdar, S. The Promise of Edge Computing. Computer 2016 , 49 , 78–81. [ Google Scholar ] [ CrossRef ]
- Ai, Y.; Peng, M.; Zhang, K. Edge Computing Technologies for Internet of Things: A Primer. Digit. Commun. Netw. 2018 , 4 , 77–86. [ Google Scholar ] [ CrossRef ]
- Arcas, G.I.; Cioara, T.; Anghel, I. Whale Optimization for Cloud–Edge-Offloading Decision-Making for Smart Grid Services. Biomimetics 2024 , 9 , 302. [ Google Scholar ] [ CrossRef ]
- Dastjerdi, A.V.; Buyya, R. Fog Computing: Helping the Internet of Things Realize Its Potential. Computer 2016 , 49 , 112–116. [ Google Scholar ] [ CrossRef ]
- Li, H.; Ota, K.; Dong, M. Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing. IEEE Netw. 2018 , 32 , 96–101. [ Google Scholar ] [ CrossRef ]
- Qureshi, R.; Irfan, M.; Ali, H.; Khan, A.; Nittala, A.S.; Ali, S.; Shah, A.; Gondal, T.M.; Sadak, F.; Shah, Z.; et al. Artificial Intelligence and Biosensors in Healthcare and Its Clinical Relevance: A Review. IEEE Access 2023 , 11 , 61600–61620. [ Google Scholar ] [ CrossRef ]
- Rauniyar, A.; Hagos, D.H.; Jha, D.; Håkegård, J.E.; Bagci, U.; Rawat, D.B.; Vlassov, V. Federated Learning for Medical Applications: A Taxonomy, Current Trends, Challenges, and Future Research Directions. IEEE Internet Things J. 2024 , 11 , 7374–7398. [ Google Scholar ] [ CrossRef ]
- Ekiz, D.; Can, Y.S.; Dardagan, Y.C.; Ersoy, C. Can a Smartband be Used for Continuous Implicit Authentication in Real Life? IEEE Access 2020 , 8 , 59402–59411. [ Google Scholar ] [ CrossRef ]
- Zhang, Y.; Wei, X.; Cao, J.; Ning, J.; Ying, Z.; Zheng, D. Blockchain-Enabled Decentralized Attribute-Based Access Control with Policy Hiding for Smart Healthcare. J. King Saud Univ.-Comput. Inf. Sci. 2022 , 34 Pt A , 8350–8361. [ Google Scholar ] [ CrossRef ]
- Mandarino, V.; Pappalardo, G.; Tramontana, E. A Blockchain-Based Electronic Health Record (EHR) System for Edge Computing Enhancing Security and Cost Efficiency. Computers 2024 , 13 , 132. [ Google Scholar ] [ CrossRef ]
- Akkaoui, R.; Hei, X.; Cheng, W. EdgeMediChain: A Hybrid Edge Blockchain-Based Framework for Health Data Exchange. IEEE Access 2020 , 8 , 113467–113486. [ Google Scholar ] [ CrossRef ]
- Rani, S.; Kataria, A.; Kumar, S.; Tiwari, P. Federated Learning for Secure IoMT-Applications in Smart Healthcare Systems: A Comprehensive Review. Knowl.-Based Syst. 2023 , 274 , 110658. [ Google Scholar ] [ CrossRef ]
- Mayer, A.H.; Rodrigues, V.F.; da Costa, C.A.; da Rosa Righi, R.; Roehrs, A.; Antunes, R.S. FogChain: A Fog Computing Architecture Integrating Blockchain and Internet of Things for Personal Health Records. IEEE Access 2021 , 9 , 122723–122737. [ Google Scholar ] [ CrossRef ]
- Ejaz, M.; Kumar, T.; Kovacevic, I.; Ylianttila, M.; Harjula, E. Health-BlockEdge: Blockchain-Edge Framework for Reliable Low-Latency Digital Healthcare Applications. Sensors 2021 , 21 , 2502. [ Google Scholar ] [ CrossRef ] [ PubMed ]
- Annane, B.; Alti, A.; Lakehal, A. Blockchain-Based Context-Aware CP-ABE Schema for Internet of Medical Things Security. Array 2022 , 14 , 100150. [ Google Scholar ] [ CrossRef ]
- Dammak, B.; Turki, M.; Cheikhrouhou, S.; Baklouti, M.; Mars, R.; Dhahbi, A. LoRaChainCare: An IoT Architecture Integrating Blockchain and LoRa Network for Personal Health Care Data Monitoring. Sensors 2022 , 22 , 1497. [ Google Scholar ] [ CrossRef ] [ PubMed ]
- Papadopoulos, G.T.; Antona, M.; Stephanidis, C. Towards Open and Expandable Cognitive AI Architectures for Large-Scale Multi-Agent Human-Robot Collaborative Learning. IEEE Access 2021 , 9 , 73890–73909. [ Google Scholar ] [ CrossRef ]
- Humayun, M.; Alsirhani, A.; Alserhani, F.; Shaheen, M.; Alwakid, G. Transformative synergy: SSEHCET—Bridging mobile edge computing and AI for enhanced eHealth security and efficiency. J. Cloud Comput. 2024 , 13 , 37. [ Google Scholar ] [ CrossRef ]
- Chamikara, M.A.P.; Bertok, P.; Khalil, I.; Liu, D.; Camtepe, S. Privacy preserving distributed machine learning with federated learning. Comput. Commun. 2021 , 171 , 112–125. [ Google Scholar ] [ CrossRef ]
- Attaullah, H.; Anjum, A.; Kanwal, T.; Malik, S.U.R.; Asheralieva, A.; Malik, H.; Zoha, A.; Arshad, K.; Imran, M.A. F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes. Sensors 2021 , 21 , 4933. [ Google Scholar ] [ CrossRef ]
- Rachakonda, L.; Bapatla, A.K.; Mohanty, S.P.; Kougianos, E. SaYoPillow: Blockchain-Integrated Privacy-Assured IoMT Framework for Stress Management Considering Sleeping Habits. IEEE Trans. Consum. Electron. 2021 , 67 , 20–29. [ Google Scholar ] [ CrossRef ]
- Sánchez-Gallegos, D.D.; Galaviz-Mosqueda, G.; González, J.L.; Villarreal, S.; Perez-Ramos, A.-E.; Carrizales-Espinoza, D.; Carretero, J. On the Continuous Processing of Health Data in Edge-Fog-Cloud Computing by Using Micro/Nanoservice Composition. IEEE Access 2020 , 8 , 120255–120281. [ Google Scholar ] [ CrossRef ]
- Loghin, D.; Ta, Q.-T.; Wang, W.; Xiao, X.; Yang, Y.; Zhang, M.; Zhang, Z.; Cai, S.; Chen, G.; Dinh, A.; et al. The Disruptions of 5G on Data-Driven Technologies and Applications. IEEE Trans. Knowl. Data Eng. 2020 , 32 , 1179–1198. [ Google Scholar ] [ CrossRef ]
- Rathore, S.; Park, J.H.; Chang, H. Deep Learning and Blockchain-Empowered Security Framework for Intelligent 5G-Enabled IoT. IEEE Access 2021 , 9 , 90075–90083. [ Google Scholar ] [ CrossRef ]
- Akter, M.; Moustafa, N.; Turnbull, B. SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems. Cogn. Comput. 2024 , 16 , 2626–2641. [ Google Scholar ] [ CrossRef ]
- Saheed, Y.K.; Arowolo, M.O. Efficient Cyber Attack Detection on the Internet of Medical Things-Smart Environment Based on Deep Recurrent Neural Network and Machine Learning Algorithms. IEEE Access 2021 , 9 , 161546–161554. [ Google Scholar ] [ CrossRef ]
- Ferrag, M.A.; Friha, O.; Maglaras, L.; Janicke, H.; Shu, L. Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis. IEEE Access 2021 , 9 , 138509–138542. [ Google Scholar ] [ CrossRef ]
- Raza, A.; Tran, K.P.; Koehl, L.; Li, S. AnoFed: Adaptive anomaly detection for digital health using transformer-based federated learning and support vector data description. Eng. Appl. Artif. Intell. 2023 , 121 , 106051. [ Google Scholar ] [ CrossRef ]
- Abdullah, S.; Arshad, J.; Khan, M.M.; Alazab, M.; Salah, K. PRISED tangle: A privacy-aware framework for smart healthcare data sharing using IOTA tangle. Complex. Intell. Syst. 2023 , 9 , 3023–3041. [ Google Scholar ] [ CrossRef ]
- Zubair, M.; Ghubaish, A.; Unal, D.; Al-Ali, A.; Reimann, T.; Alinier, G.; Hammoudeh, M.; Qadir, J. Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System. Sensors 2022 , 22 , 8280. [ Google Scholar ] [ CrossRef ]
- Rehman, A.; Saba, T.; Haseeb, K.; Alam, T.; Lloret, J. Sustainability Model for the Internet of Health Things (IoHT) Using Reinforcement Learning with Mobile Edge Secured Services. Sustainability 2022 , 14 , 12185. [ Google Scholar ] [ CrossRef ]
- Zhang, J.; Ouda, A.; Abu-Rukba, R. Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks. Future Internet 2024 , 16 , 209. [ Google Scholar ] [ CrossRef ]
- Hernandez-Jaimes, M.L.; Martinez-Cruz, A.; Ramírez-Gutiérrez, K.A.; Feregrino-Uribe, C. Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets and Cloud–Fog–Edge architectures. Internet Things 2023 , 23 , 100887. [ Google Scholar ] [ CrossRef ]
- Zhang, J.; Zhang, F.; Huang, X.; Liu, X. Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence. IEEE Trans. Dependable Secur. Comput. 2021 , 18 , 2835–2847. [ Google Scholar ] [ CrossRef ]
- Ullah, I.; Khan, M.A.; Alkhalifah, A.; Nordin, R.; Alsharif, M.H.; Alghtani, A.H.; Aly, A.A. A Multi-Message Multi-Receiver Signcryption Scheme with Edge Computing for Secure and Reliable Wireless Internet of Medical Things Communications. Sustainability 2021 , 13 , 13184. [ Google Scholar ] [ CrossRef ]
- Zhang, L.; Wang, X.; Wang, J.; Pung, R.; Wang, H.; Lam, K.-Y. An Efficient FHE-Enabled Secure Cloud–Edge Computing Architecture for IoMT Data Protection with its Application to Pandemic Modeling. IEEE Internet Things J. 2024 , 11 , 15272–15284. [ Google Scholar ] [ CrossRef ]
- Scrugli, M.A.; Loi, D.; Raffo, L.; Meloni, P. An Adaptive Cognitive Sensor Node for ECG Monitoring in the Internet of Medical Things. IEEE Access 2022 , 10 , 1688–1705. [ Google Scholar ] [ CrossRef ]
- Djelouat, H.; Al Disi, M.; Boukhenoufa, I.; Amira, A.; Bensaali, F.; Kotronis, C.; Politi, E.; Nikolaidou, M.; Dimitrakopoulos, G. Real-time ECG monitoring using compressive sensing on a heterogeneous multicore edge-device. Microprocess. Microsyst. 2020 , 72 , 102839. [ Google Scholar ] [ CrossRef ]
- Irshad, R.R.; Hussain, S.; Sohail, S.S.; Zamani, A.S.; Madsen, D.Ø.; Alattab, A.A.; Ahmed, A.A.A.; Norain, K.A.A.; Alsaiari, O.A.S. A Novel IoT-Enabled Healthcare Monitoring Framework and Improved Grey Wolf Optimization Algorithm-Based Deep Convolution Neural Network Model for Early Diagnosis of Lung Cancer. Sensors 2023 , 23 , 2932. [ Google Scholar ] [ CrossRef ]
- Sakib, S.; Fouda, M.M.; Al-Mahdawi, M.; Mohsen, A.; Oogane, M.; Ando, Y.; Fadlullah, Z.M. Deep Learning Models for Magnetic Cardiography Edge Sensors Implementing Noise Processing and Diagnostics. IEEE Access 2022 , 10 , 2656–2668. [ Google Scholar ] [ CrossRef ]
- Velichko, A.; Huyut, M.T.; Belyaev, M.; Izotov, Y.; Korzun, D. Machine Learning Sensors for Diagnosis of COVID-19 Disease Using Routine Blood Values for Internet of Things Application. Sensors 2022 , 22 , 7886. [ Google Scholar ] [ CrossRef ]
- Hemalatha, M. A hybrid random forest deep learning classifier empowered edge cloud architecture for COVID-19 and pneumonia detection. Expert Syst. Appl. 2022 , 210 , 118227. [ Google Scholar ] [ CrossRef ]
- Antal, C.; Cioara, T.; Antal, M.; Anghel, I. Blockchain Platform For COVID-19 Vaccine Supply Management. IEEE Open J. Comput. Soc. 2021 , 2 , 164–178. [ Google Scholar ] [ CrossRef ]
- Badawy, M.; Balaha, H.M.; Maklad, A.S.; Almars, A.M.; Elhosseini, M.A. Revolutionizing Oral Cancer Detection: An Approach Using Aquila and Gorilla Algorithms Optimized Transfer Learning-Based CNNs. Biomimetics 2023 , 8 , 499. [ Google Scholar ] [ CrossRef ] [ PubMed ]
- Wan, S.; Gu, Z.; Ni, Q. Cognitive computing and wireless communications on the edge for healthcare service robots. Comput. Commun. 2020 , 149 , 99–106. [ Google Scholar ] [ CrossRef ]
- Kim, J.; Kang, H.; Yang, J.; Jung, H.; Lee, S.; Lee, J. Multitask Deep Learning for Human Activity, Speed, and Body Weight Estimation Using Commercial Smart Insoles. IEEE Internet Things J. 2023 , 10 , 16121–16133. [ Google Scholar ] [ CrossRef ]
- Alekseeva, D.; Ometov, A.; Arponen, O.; Lohan, E.S. The future of computing paradigms for medical and emergency applications. Comput. Sci. Rev. 2022 , 45 , 100494. [ Google Scholar ] [ CrossRef ]
- Wang, W.-H.; Hsu, W.-S. Integrating Artificial Intelligence and Wearable IoT System in Long-Term Care Environments. Sensors 2023 , 23 , 5913. [ Google Scholar ] [ CrossRef ]
- Elbagoury, B.M.; Vladareanu, L.; Vlădăreanu, V.; Salem, A.B.; Travediu, A.-M.; Roushdy, M.I. A Hybrid Stacked CNN and Residual Feedback GMDH-LSTM Deep Learning Model for Stroke Prediction Applied on Mobile AI Smart Hospital Platform. Sensors 2023 , 23 , 3500. [ Google Scholar ] [ CrossRef ]
- Paramasivam, A.; Shahila, D.F.D.; Jenath, M.; Sivakumaran, T.S.; Sankaran, S.; Reddy Pittu, P.S.K.; Vijayalakshmi, S. Development of artificial intelligence edge computing based wearable device for fall detection and prevention of elderly people. Heliyon 2024 , 10 , e28688. [ Google Scholar ]
- Monti, L.; Tse, R.; Tang, S.-K.; Mirri, S.; Delnevo, G.; Maniezzo, V.; Salomoni, P. Edge-Based Transfer Learning for Classroom Occupancy Detection in a Smart Campus Context. Sensors 2022 , 22 , 3692. [ Google Scholar ] [ CrossRef ]
- Wilhelm, S.; Kasbauer, J. Exploiting Smart Meter Power Consumption Measurements for Human Activity Recognition (HAR) with a Motif-Detection-Based Non-Intrusive Load Monitoring (NILM) Approach. Sensors 2021 , 21 , 8036. [ Google Scholar ] [ CrossRef ]
- Janbi, N.; Mehmood, R.; Katib, I.; Albeshri, A.; Corchado, J.M.; Yigitcanlar, T. Imtidad: A Reference Architecture and a Case Study on Developing Distributed AI Services for Skin Disease Diagnosis over Cloud, Fog and Edge. Sensors 2022 , 22 , 1854. [ Google Scholar ] [ CrossRef ]
- Chen, M.; Zhou, P.; Wu, D.; Hu, L.; Hassan, M.M.; Alamri, A. AI-Skin: Skin disease recognition based on self-learning and wide data collection through a closed-loop framework. Inf. Fusion 2020 , 54 , 1–9. [ Google Scholar ] [ CrossRef ]
- Jain, V.; Gupta, G.; Gupta, M.; Sharma, D.K.; Ghosh, U. Ambient intelligence-based multimodal human action recognition for autonomous systems. ISA Trans. 2023 , 132 , 94–108. [ Google Scholar ] [ CrossRef ] [ PubMed ]
- Arikumar, K.S.; Prathiba, S.B.; Alazab, M.; Gadekallu, T.R.; Pandya, S.; Khan, J.M.; Moorthy, R.S. FL-PMI: Federated Learning-Based Person Movement Identification through Wearable Devices in Smart Healthcare Systems. Sensors 2022 , 22 , 1377. [ Google Scholar ] [ CrossRef ] [ PubMed ]
- Kumar, A.; Sharma, K.; Sharma, A. Genetically optimized Fuzzy C-means data clustering of IoMT-based biomarkers for fast affective state recognition in intelligent edge analytics. Appl. Soft Comput. 2021 , 109 , 107525. [ Google Scholar ] [ CrossRef ]
- Sodhro, A.H.; Zahid, N. AI-Enabled Framework for Fog Computing Driven E-Healthcare Applications. Sensors 2021 , 21 , 8039. [ Google Scholar ] [ CrossRef ]
- Lakhan, A.; Sodhro, A.H.; Majumdar, A.; Khuwuthyakorn, P.; Thinnukool, O. A Lightweight Secure Adaptive Approach for Internet-of-Medical-Things Healthcare Applications in Edge-Cloud-Based Networks. Sensors 2022 , 22 , 2379. [ Google Scholar ] [ CrossRef ]
- Kumar, A.; Krishnamurthi, R.; Nayyar, A.; Sharma, K.; Grover, V.; Hossain, E. A Novel Smart Healthcare Design, Simulation, and Implementation Using Healthcare 4.0 Processes. IEEE Access 2020 , 8 , 118433–118471. [ Google Scholar ] [ CrossRef ]
- Maksymyuk, T.; Gazda, J.; Bugár, G.; Gazda, V.; Liyanage, M.; Dohler, M. Blockchain-Empowered Service Management for the Decentralized Metaverse of Things. IEEE Access 2022 , 10 , 99025–99037. [ Google Scholar ] [ CrossRef ]
- Lakhan, A.; Mohammed, M.A.; Abdulkareem, K.H.; Jaber, M.M.; Nedoma, J.; Martinek, R.; Zmij, P. Delay Optimal Schemes for Internet of Things Applications in Heterogeneous Edge Cloud Computing Networks. Sensors 2022 , 22 , 5937. [ Google Scholar ] [ CrossRef ]
- Bojović, P.D.; Malbašić, T.; Vujošević, D.; Martić, G.; Bojović, Ž. Dynamic QoS Management for a Flexible 5G/6G Network Core: A Step toward a Higher Programmability. Sensors 2022 , 22 , 2849. [ Google Scholar ] [ CrossRef ]
- Kim, J.A.; Park, D.G.; Jeong, J. Design and performance evaluation of cost-effective function-distributed mobility management scheme for software-defined smart factory networking. J. Ambient. Intell. Humaniz. Comput. 2020 , 11 , 2291–2307. [ Google Scholar ] [ CrossRef ]
- Pandya, S.; Srivastava, G.; Jhaveri, R.; Babu, M.R.; Bhattacharya, S.; Maddikunta, P.K.R.; Mastorakis, S.; Piran, M.J.; Gadekallu, T.R. Federated learning for smart cities: A comprehensive survey. Sustain. Energy Technol. Assess. 2023 , 55 , 102987. [ Google Scholar ] [ CrossRef ]
- Talaat, F.M. Effective prediction and resource allocation method (EPRAM) in fog computing environment for smart healthcare system. Multimed. Tools Appl. 2022 , 81 , 8235–8258. [ Google Scholar ] [ CrossRef ]
- Shumba, A.-T.; Montanaro, T.; Sergi, I.; Fachechi, L.; De Vittorio, M.; Patrono, L. Leveraging IoT-Aware Technologies and AI Techniques for Real-Time Critical Healthcare Applications. Sensors 2022 , 22 , 7675. [ Google Scholar ] [ CrossRef ] [ PubMed ]
- Nasser, N.; Fadlullah, Z.M.; Fouda, M.M.; Ali, A.; Imran, M. A lightweight federated learning based privacy preserving B5G pandemic response network using unmanned aerial vehicles: A proof-of-concept. Comput. Netw. 2022 , 205 , 108672. [ Google Scholar ] [ CrossRef ]
- Lin, B.; Yu, T.; Peng, C.; Lin, C.; Hsu, H.; Lee, I.; Zhang, Z. Fall Detection System with Artificial Intelligence-Based Edge Computing. IEEE Access 2022 , 10 , 4328–4339. [ Google Scholar ] [ CrossRef ]
- Velichko, A. A Method for Medical Data Analysis Using the LogNNet for Clinical Decision Support Systems and Edge Computing in Healthcare. Sensors 2021 , 21 , 6209. [ Google Scholar ] [ CrossRef ]
- Shynu, P.G.; Menon, V.G.; Kumar, R.L.; Kadry, S.; Nam, Y. Blockchain-Based Secure Healthcare Application for Diabetic-Cardio Disease Prediction in Fog Computing. IEEE Access 2021 , 9 , 45706–45720. [ Google Scholar ] [ CrossRef ]
- Mutlag, A.A.; Ghani, M.K.A.; Mohammed, M.A.; Lakhan, A.; Mohd, O.; Abdulkareem, K.H.; Garcia-Zapirain, B. Multi-Agent Systems in Fog–Cloud Computing for Critical Healthcare Task Management Model (CHTM) Used for ECG Monitoring. Sensors 2021 , 21 , 6923. [ Google Scholar ] [ CrossRef ]
- Gómez-Valiente, P.; Benedí, J.P.; Lillo-Castellano, J.M.; Marina-Breysse, M. Smart-IoT Business Process Management: A Case Study on Remote Digital Early Cardiac Arrhythmia Detection and Diagnosis. IEEE Internet Things J. 2023 , 10 , 16744–16757. [ Google Scholar ] [ CrossRef ]
- Hassan, S.R.; Ahmad, I.; Ahmad, S.; Alfaify, A.; Shafiq, M. Remote Pain Monitoring Using Fog Computing for e-Healthcare: An Efficient Architecture. Sensors 2020 , 20 , 6574. [ Google Scholar ] [ CrossRef ] [ PubMed ]
- Wen, F.; He, T.; Liu, H.; Chen, H.-Y.; Zhang, T.; Lee, C. Advances in Chemical Sensing Technology for Enabling the Next-Generation Self-Sustainable Integrated Wearable System in the IoT Era. Nano Energy 2020 , 78 , 105155. [ Google Scholar ] [ CrossRef ]
- Syed Sabir Mohamed, S.; Gopi, R.; Thiruppathy Kesavan, V.; Kaliyaperumal, K. Adaptive heuristic edge assisted fog computing design for healthcare data optimization. J. Cloud Comput. 2024 , 13 , 127. [ Google Scholar ]
- Liu, Q.; Tian, Z.; Wang, N.; Lin, Y. DRL-based dependent task offloading with delay-energy tradeoff in medical image edge computing. Complex. Intell. Syst. 2024 , 10 , 3283–3304. [ Google Scholar ] [ CrossRef ]
- Kumar, R.H.; Rajaram, B. Design and Simulation of an Edge Compute Architecture for IoT-Based Clinical Decision Support System. IEEE Access 2024 , 12 , 45456–45474. [ Google Scholar ] [ CrossRef ]
- Sachin, D.N.; Annappa, B.; Hegde, S.; Abhijit, C.S.; Ambesange, S. FedCure: A Heterogeneity-Aware Personalized Federated Learning Framework for Intelligent Healthcare Applications in IoMT Environments. IEEE Access 2024 , 12 , 15867–15883. [ Google Scholar ]
Click here to enlarge figure
Screening Phase Inclusion Criteria | Eligibility Phase Exclusion Criteria |
---|
Type of paper: Article | Not available (could not be retrieved) |
Timeline: 2020–2024 | Not related to the edge in healthcare topic |
Main Research Areas: Computer Science, Engineering, Healthcare Sciences | Not connected to the computer science domain |
Language: English | Low number of citations (for 2020–2023 articles) |
High-Impact journals of top 4 publishers: MDPI, IEEE, Elsevier, and Springer | Q3 or lower-quartile-indexed articles |
Open Access: Gold and Gold-Hybrid | |
Articles | Addressed Issues | Security/Privacy/AI Technique/Technology |
---|
[ ] | Authentication; User privacy and data quality | Authentication using heart rate variability (HRV) from wearable devices + ML classifiers |
[ ] | LRAKE protocol |
[ ] | EHR data management; Health data privacy; Scalability and compliance with regulations | Blockchain + Attribute-based encryption |
[ ] | Blockchain |
[ ] | Privacy-aware FL |
[ ] | Blockchain + InterPlanetary File System (IPFS) |
[ ] | Cryptography |
[ ] | Distributed ledger technologies (DLT) + masked authenticated messaging |
[ ] | Two-phase encryption + RL |
[ ] | Blockchain + DApps |
[ , , , ] | Authorization; Real-time data processing; Privacy; Scalability | Blockchain + Cryptography |
[ ] | Differential privacy + six-way authentication |
[ ] | Symmetric polynomials + NTRU encyption + Symmetric ecryption |
[ ] | IoMT Data Management; Scalability; Computational overhead | Blockchain + FL |
[ ] | Blockchain + DL |
[ ] | Certificate-based signcryption |
[ ] | Blockchain + Smart Agent |
[ ] | Distributed data privacy | DISTPAB algorithm + FL |
[ ] | 5G technologies + FL |
[ ] | Data privacy; Anonymity | F-Classify privacy-preserving model |
[ ] | Fully homomorphic encryption |
[ ] | Cyber-attack detection in IoMT; Anomaly detection and pattern recognition | DL + supervised ML + IDS technique |
[ ] | ML + bio-inspired + IDS techniques |
[ ] | FL + blockchain + IDS techniques |
[ ] | Transformer + FL + Support Vector Data Description (SVDD) |
[ ] | DL + IDS techniques |
Article | Healthcare Use Case | Optimization Objective | Algorithms/Techniques |
---|
[ ] | Cardiovascular disease monitoring | Reduce power consumption and optimize computational capabilities of edge devices | CNN |
[ ] | Lung cancer detection | Reduce the computational demand of edge devices; Improve the response time. | DCNN + Grey Wolf Optimization |
[ ] | Detection and classification of arrhythmias | Improve the quality of monitored signals by optimizing edge devices operation | CNN + CNN-LSTM + CNN-GRU |
[ ] | Remote monitoring | Improve edge processing time for the detection algorithms | Transfer learning |
[ ] | COVID-19 detection | Improve classification accuracy on edge devices | LogNNet |
[ ] | Human activity recognition | Optimize energy efficiency of smart homes | NILM |
[ ] | Skin disease diagnosis | Improve energy consumption and response times in distributed edge devices | DL + Tiny AI |
[ ] | Remote monitoring | Improve feature extraction and reduce computational load at the edge | MobileNetV2 |
[ ] | Human activity recognition | Optimize the processing of sensor data | Bi-CRNN |
[ ] | Oral cancer detection | Optimize the image classification task at the edge | CNN + AO + GTO |
[ ] | Human activity recognition | Optimize distributed data labeling processes | FL + DRL |
[ ] | Real-time health monitoring | Improve communication in edge networks | Cognitive computing |
[ ] | Emergency IoMT | Improve edge processing | FL |
[ ] | COVID-19 and pneumonia diagnostics | Improve communication speed between edge devices | MOMHTS + RF + DL |
[ ] | Vaccine administration management | Improve throughput and scalability of distributed data sharing and processing | Blockchain |
[ ] | Real-time ECG monitoring | Reduce energy consumption and hardware requirements on edge devices | Greedy |
[ ] | Long-term care for elders | Optimize resource allocation | DL |
[ ] | Diagnosis of skin diseases | Improve adaptation of edge resources | DL |
[ ] | Affective state recognition | Improve precision and response time | Fuzzy C-means |
[ ] | Remote monitoring | Improve edge computation and processing | FSIRA |
[ ] | Stroke prediction | Reducing the diagnostic time at the edge | LSTM |
[ ] | Hospital IoMT-enabled data management | Optimize of workflows across edge nodes | LSEOS |
[ ] | Elderly fall detection | Reduce and optimize deployment on edge devices | CNN-LSTM with attention layer |
Strengths | Weaknesses | Opportunities | Threats |
---|
Real-time data monitoring, processing and analysis | Limited computational resources | Growing demand for remote monitoring and telehealth | Security and vulnerabilities of healthcare edge devices |
Enhanced patient data security and privacy | Complex data orchestration and healthcare management processes | Personalized care with edge AI advancements | Patient safety, data privacy, and integrity |
Reduced network overhead | Low scalability | Growth in IoT devices adoption for telecare | Network infrastructure limitations in data transmission, processing, and intermittent connectivity |
Improved reliability for eHealth services | Interoperability and data integration challenges | Development of efficient distributed and federated AI models including LLMs | Fragmented healthcare systems and vendor lock-in |
AI enabled support for healthcare professionals | High costs for infrastructure setup | Advancements in data encryption | Regulatory constraints |
| The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
Share and Cite
Rancea, A.; Anghel, I.; Cioara, T. Edge Computing in Healthcare: Innovations, Opportunities, and Challenges. Future Internet 2024 , 16 , 329. https://doi.org/10.3390/fi16090329
Rancea A, Anghel I, Cioara T. Edge Computing in Healthcare: Innovations, Opportunities, and Challenges. Future Internet . 2024; 16(9):329. https://doi.org/10.3390/fi16090329
Rancea, Alexandru, Ionut Anghel, and Tudor Cioara. 2024. "Edge Computing in Healthcare: Innovations, Opportunities, and Challenges" Future Internet 16, no. 9: 329. https://doi.org/10.3390/fi16090329
Article Metrics
Article access statistics, further information, mdpi initiatives, follow mdpi.
Subscribe to receive issue release notifications and newsletters from MDPI journals
IMAGES
VIDEO
COMMENTS
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers. The security challenges associated with cloud computing have been widely studied in the literature. This systematic literature review (SLR) is aimed to review the existing research studies on cloud computing security, threats, and ...
7.1. Challenges. Via analysis and contrast, we observe that cloud computing security protection work has achieved satisfactory research results. However, many problems remain, which prompt the consideration of a variety of security factors and continuous improvements in defense technology and security strategies. 1.
The security challenges associated with cloud computing have been widely studied in the literature. This systematic literature review (SLR) is aimed to review the existing research studies on ...
This research report systematically investigates various challenges and vulnerabilities in cloud computing, focusing on security and privacy issues. This study comprehensively examines potential ...
in this paper focuses on development of cloud computing, privacy security issues have become increasingly prominent, which is of concern to industry and academia. We review the research progress on privacy security issues from the perspective of several privacy security protection technologies in cloud computing. First, we introduce some privacy security risks of cloud computing and propose a ...
Cloud computing has gained huge attention over the past decades because of continuously increasing demands. There are several advantages to organizations moving toward cloud-based data storage solutions. These include simplified IT infrastructure and management, remote access from effectively anywhere in the world with a stable Internet connection and the cost efficiencies that cloud computing ...
In this study, we surveyed service-based cloud computing security issues to establish the current state of the field. The main contribution of this paper is to analyze the state of cloud security in the last decade and provide a unified taxonomy of security issues over the three-layer model, i.e., IaaS, PaaS, and SaaS. 1.
This paper presents an overview and study of cloud computing, with several security threats, security issues, currently used cloud technologies and countermeasures. The security challenges in cloud computing are formidable, especially for public clouds whose infrastructure and computational resources are owned by an outside party that sells ...
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of the pay-as-you-go price model. However, outsourcing information and business applications to the cloud or a third party raises security and ...
The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents ...
However, it has become essential for organizations to ensure the security of their applications, data, and cloud-based networks to use cloud services effectively. This systematic literature review aims to determine the latest information regarding cloud computing security, with a specific emphasis on threats and mitigation strategies.
The advent of new technologies and applications coupled with the COVID-19 pandemic tremendously increased cloud computing adoption in private and public institutions (government) and raised the demand for communication and access to a shared pool of resources and storage capabilities. Governments across the globe are moving to the cloud to improve services, reduce costs, and increase ...
Downloads (cumulative) 3,890. 2021. Abstract. It is our great pleasure to welcome you to the 12th anniversary of the ACM Cloud Computing Security Workshop. CCSW is the world's premier forum bringing together researchers and practitioners in all security aspects of cloud-centric and outsourced computing including: Side channel attacks.
Data security and privacy are inevitable requirement of cloud environment. Massive usage and sharing of data among users opens door to security loopholes. This paper envisages a discussion of cloud environment, its utilities, challenges, and emerging research trends confined to secure processing and sharing of data. Comments: 9 pages, 3 figures.
Abstract. Cloud computing provides computing resources, platforms, and applications as a service in a flexible, cost-effective, and efficient way. Cloud computing has integrated with industry and many other fields in recent years, which prompted researchers to look into new technologies. Cloud users have moved their applications, data and ...
Cloud computing has grown to become an integral part of present as well as future information technologies. This technology has been designed to be used with internet by providing features such as information storage, remote access, etc. Cloud computing has been proved as an effective tool for all the provided services but it also comes with various types of threats. Over the years of its ...
Abstract. Cyber security has become a very critical concern that needs the attention of researchers, academicians, and organizations to confidentially ensure the protection and security of information systems. Due to the increasing demand for digitalization, every individual and organization faces continually shifting cyber threats.
The purpose of writing this paper is analyzing the whole cloud computing model security issues. The specific objective is to describe and identify the various attack vectors and security issues ...
This research shows that integrity, availability, and network security are important issues in the cloud computing infrastructure. A developmental study has mentioned integrity and availability as challenging problems in implementing cloud-based services, especially when losing or leaking information could result in major legal- or business ...
In a multi-inhabitant world, this paper talks about the various information assurance worries in distributed computing and recommends way to deal with tackle security issues and investigates information insurance. It's an examination about cloud information and part of security identified with it.
Cloud computing has emerged as a transformative technology, revolutionizing how organizations handle data, applications, and services. However, along with its benefits, cloud computing presents unique security challenges. This research paper explores the various security issues, threats, and potential solutions in cloud computing environments. By examining current trends, industry best ...
This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data. Export citation and abstract BibTeX RIS.
Recently, cloud computing has become a growing technology in the information technology industry because of its several smooth delivery services. In cloud computing, multi-tenancy is one of the primary features that affords economic and scalability significance to the service providers and end-users by distributing a similar cloud platform. Due to the increasing demand for cloud computing ...
For example, user permissions when accessing the network or processes that specify when and where information may be stored or shared (Ogbanufe, 2021). Cloud Security: Protects information in the cloud (based on the software), and monitors to remove the on-site attacks risks (Krishnasamy and Venkatachalam, 2021).
The methodical research provides a comprehensive overview of the current state of cloud computing, with a specific focus on trends, barriers, and potential. This article analyzes advancements in cloud architectures, deployment approaches, and service paradigms, unveiling the latest trends. The study examines the impacts of advanced technologies such as artificial intelligence, serverless ...
Edge computing promising a vision of processing data close to its generation point, reducing latency and bandwidth usage compared with traditional cloud computing architectures, has attracted significant attention lately. The integration of edge computing in modern systems takes advantage of Internet of Things (IoT) devices and can potentially improve the systems' performance, scalability ...