Author:
Gupta Ambika,Namasudra Suyel,Kumar Prabhat
Publisher
Springer Science and Business Media LLC
Reference48 articles.
1. Chaudhari RA, Gohil BN, Rao UP (2023) A review on cloud security issues and solutions. J Comput Secur 31:365–391
2. Abdul-Jabbar SS, Aldujaili A, Mohammed SG, Saeed HS (2020) Integrity and security in cloud computing environment: a review. J Southwest Jiaotong Univ 55:1–15
3. Gupta S, Kumar P, Singh JP, Singh MP (2016) Privacy preservation of source location using phantom nodes. In: Latifi S (ed) Information technology: new generations. Springer, New York, pp 247–256
4. Donno MD, Giaretta A, Dragoni N, Bucchiarone A, Mazzara M (2019) Cyber-storms come from clouds: security of cloud computing in the IoT era. Future Internet 11:1–31. https://doi.org/10.3390/fi11060127
5. Das S, Namasudra S, Deb S, Ger PM, Crespo RG (2023) Securing IoT-based smart healthcare systems by using advanced lightweight privacy-preserving authentication scheme. IEEE Internet Things J 1:1–10