Dữ liệu đám mây (Cập nhật đến ngày 5/5/2023)
Cập nhật vào: Thứ năm - 04/05/2023 22:31
Cỡ chữ
Cục Thông tin khoa học và công nghệ quốc gia trân trọng kính gửi đến các nhà khoa học những bài viết nghiên cứu về Dữ liệu đám mây. Bao gồm những bài viết đã được xuất bản chính thức và các bài viết được chấp nhận đăng trên những cơ sở dữ liệu học thuật chính thống cập nhật đến ngày 5/5/2023.
1. Sciencedirect
1. An efficient key validation mechanism with VANET in real-time cloud monitoring metrics to enhance cloud storage and security
Sustainable Energy Technologies and Assessments3 January 2023Volume 56 (Cover date: March 2023) Article 102970
K. Lakshmi NarayananR. Naresh
https://www.sciencedirect.com/science/article/pii/S2213138822010189/pdfft?md5=49333202b6b9097b750f499bb3fd2207&pid=1-s2.0-S2213138822010189-main.pdf
2. A Confidentiality-based data Classification-as-a-Service (C2aaS) for cloud security
Alexandria Engineering Journal2 November 2022Volume 64 (Cover date: 1 February 2023) Pages 749-760
Munwar AliLow Tang JungZeeshan Gillani
https://www.sciencedirect.com/science/article/pii/S111001682200713X/pdfft?md5=3cbb71e3e0c380a1bb5713888995b5a4&pid=1-s2.0-S111001682200713X-main.pdf
3. SoK: Run-time security for cloud microservices. Are we there yet?
Computers & Security24 January 2023Volume 127 (Cover date: April 2023)Article 103119
Francesco MinnaFabio Massacci
https://www.sciencedirect.com/science/article/pii/S0167404823000299/pdfft?md5=b7e42fc82ac5cc46406d72181ac3142f&pid=1-s2.0-S0167404823000299-main.pdf
4. Full-stack Vulnerability Analysis of the Cloud-native Platform
Computers & SecurityAvailable online 6 March 2023In press, journal pre-proofArticle 103173
Qingyang ZengMohammad KavousiYan Chen
https://www.sciencedirect.com/science/article/pii/S0167404823000834/pdfft?md5=5ac56cd1d7893222f5455232723e0616&pid=1-s2.0-S0167404823000834-main.pdf
5. Service separation assisted DDoS attack mitigation in cloud targets
Journal of Information Security and Applications31 January 2023Volume 73 (Cover date: March 2023)Article 103435
Anmol KumarGaurav Somani
https://www.sciencedirect.com/science/article/pii/S2214212623000200/pdfft?md5=b4ca8a60d7269d616e44a16255ab0d97&pid=1-s2.0-S2214212623000200-main.pdf
6. Malicious insider threat detection using variation of sampling methods for anomaly detection in cloud environment
Computers and Electrical Engineering2 December 2022Volume 105 (Cover date: January 2023)Article 108519
Asha SShanmugapriya DPadmavathi G
https://www.sciencedirect.com/science/article/pii/S0045790622007340/pdfft?md5=ae473831d1e15c34ea45aa8a1b8c57a0&pid=1-s2.0-S0045790622007340-main.pdf
7. Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism
Future Generation Computer Systems24 January 2023Volume 143 (Cover date: June 2023)Pages 179-190
Shu-Yu KuoFan-Hsun TsengYao-Hsin Chou
https://www.sciencedirect.com/science/article/pii/S0167739X23000249/pdfft?md5=c998ed37471f9d302dd7df193b42c0d5&pid=1-s2.0-S0167739X23000249-main.pdf
8. Detection of DDoS attacks in D2D communications using machine learning approach
Computer Communications16 November 2022Volume 198 (Cover date: 15 January 2023)Pages 32-51
S. V. Jansi RaniIacovos IoannouAndreas Pitsillides
https://www.sciencedirect.com/science/article/pii/S0140366422004364/pdfft?md5=e2a0f9318db8ebb0c4e996bd346469f4&pid=1-s2.0-S0140366422004364-main.pdf
9. A secure optimal placement strategy based on Monte Carlo simulation and hypothesis testing
Future Generation Computer Systems6 August 2022Volume 138 (Cover date: January 2023)Pages 89-103
Marwa ThabetMouhebeddine BerrimaBrahim Hnich
https://www.sciencedirect.com/science/article/pii/S0167739X2200259X/pdfft?md5=7425b9cbb94724cbb0c887ef5153b63b&pid=1-s2.0-S0167739X2200259X-main.pdf
10. Information security for big data using the NTRUEncrypt method
Measurement: SensorsAvailable online 8 March 2023In press, journal pre-proofArticle 100738
Mohammed Khalid YousifZena Ez DallalbashiShahab Wahhab Kareem
https://www.sciencedirect.com/science/article/pii/S2665917423000740/pdfft?md5=d48883c9f5496a968beca4302bf3a5ba&pid=1-s2.0-S2665917423000740-main.pdf
11. Optimal cluster based feature selection for intrusion detection system in web and cloud computing environment using hybrid teacher learning optimization enables deep recurrent neural network
Computer Communications17 February 2023Volume 202 (Cover date: 15 March 2023)Pages 145-153
K. G. MaheswariC. SivaG. Nalinipriya
https://www.sciencedirect.com/science/article/pii/S0140366423000415/pdfft?md5=dcf3c4f332a9147364b13b876edb2d4f&pid=1-s2.0-S0140366423000415-main.pdf
12. Research on cloud data encryption algorithm based on bidirectional activation neural network
Information Sciences28 November 2022Volume 622 (Cover date: April 2023)Pages 629-651
Zhenlong ManJinqing LiXiaohan Sun
https://www.sciencedirect.com/science/article/pii/S0020025522013809/pdfft?md5=f71aeaf44353c044e0425924a782d25e&pid=1-s2.0-S0020025522013809-main.pdf
13. Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine
Digital Communications and Networks5 October 2022Volume 9, Issue 1 (Cover date: February 2023)Pages 111-124
Haifeng LinQilin XueDi Bai
https://www.sciencedirect.com/science/article/pii/S2352864822001961/pdfft?md5=d9fd79f3d0133160dcb505b529aeaf4a&pid=1-s2.0-S2352864822001961-main.pdf
14. Certificateless multi-source elliptic curve ring signcryption for cloud computing
Journal of Information Security and Applications7 March 2023Volume 74 (Cover date: May 2023)Article 103449
Huifang YuJunze LiuZhicang Wang
https://www.sciencedirect.com/science/article/pii/S2214212623000339/pdfft?md5=a53b0ef6d8e51a29182ad3e17045befa&pid=1-s2.0-S2214212623000339-main.pdf
15. A privacy-preserving cross-media retrieval on encrypted data in cloud computing
Journal of Information Security and Applications7 February 2023Volume 73 (Cover date: March 2023)Article 103440
Zhangdong WangJiaohua QinJia Peng
https://www.sciencedirect.com/science/article/pii/S221421262300025X/pdfft?md5=55bde4898ebaa2ae4dbc36259ab13537&pid=1-s2.0-S221421262300025X-main.pdf
16. An efficacy analysis of data encryption architecture for cloud platform
Procedia Computer Science31 January 2023Volume 218 (Cover date: 2023)Pages 989-1002
Sheenam MalhotraWilliamjeet Singh
https://www.sciencedirect.com/science/article/pii/S1877050923000790/pdfft?md5=2fd22af55db805ea5d8ca80720456213&pid=1-s2.0-S1877050923000790-main.pdf
17. A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment
Journal of Information Security and Applications17 December 2022Volume 72 (Cover date: February 2023)Article 103377
Venkata Bhikshapathi ChenamSyed Taqi Ali
https://www.sciencedirect.com/science/article/pii/S2214212622002204/pdfft?md5=f39fb51be7588c3c0dbd330c3d9ae717&pid=1-s2.0-S2214212622002204-main.pdf
18. A mechanism to detecting flooding attacks in quantum enabled cloud-based lowpower and lossy networks
Theoretical Computer Science24 August 2022Volume 941 (Cover date: 4 January 2023)Pages 29-38
Sreejyothsna AnkamDr. N. Sudhakar Reddy
https://www.sciencedirect.com/science/article/pii/S0304397522004923/pdfft?md5=45fb29d9705364fe5aad304d3b4c7943&pid=1-s2.0-S0304397522004923-main.pdf
19. A sustainable Ethereum merge-based Big-Data gathering and dissemination in IIoT System
Alexandria Engineering Journal8 February 2023Volume 69 (Cover date: 15 April 2023)Pages 109-119
Ravi SharmaBalázs Villányi
https://www.sciencedirect.com/science/article/pii/S1110016823000820/pdfft?md5=036beb2ccdd6bcffff59f833815e9a65&pid=1-s2.0-S1110016823000820-main.pdf
20. Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment
Journal of Information Security and Applications7 December 2022Volume 72 (Cover date: February 2023)Article 103389
Mahreen SaleemM. R. WarsiSaiful Islam
https://www.sciencedirect.com/science/article/pii/S2214212622002332/pdfft?md5=46e42941b5fa9e1ea6be82cf87912179&pid=1-s2.0-S2214212622002332-main.pdf
21. The role of digital transformation in improving the efficacy of healthcare: A systematic review
The Journal of High Technology Management Research24 November 2022Volume 34, Issue 1 (Cover date: May 2023)Article 100442
Marcelo DionisioSylvio Jorge de Souza JuniorPaulo César Pellanda
https://www.sciencedirect.com/science/article/pii/S1047831022000177/pdfft?md5=f110a8cda68d9044344b54a8ebf87bed&pid=1-s2.0-S1047831022000177-main.pdf
22. Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing
Computers & Security20 November 2022Volume 125 (Cover date: February 2023)Article 103019
Wenfang ZhangHeng JiaoMuhammad Khurram Khan
https://www.sciencedirect.com/science/article/pii/S0167404822004114/pdfft?md5=386187c1da6cc0bbcdedfbe303d42e9b&pid=1-s2.0-S0167404822004114-main.pdf
23. A scalable, secure, and semantically interoperable client for cloud-enabled Demand Response
Future Generation Computer Systems9 November 2022Volume 141 (Cover date: April 2023)Pages 54-66
Andrea CimminoJuan Cano-BenitoDimitrios Tzovaras
https://www.sciencedirect.com/science/article/pii/S0167739X22003648/pdfft?md5=4ee359a91acee4ea44f3c019a74387ac&pid=1-s2.0-S0167739X22003648-main.pdf
24. Blockchain based efficient tamper-proof EHR storage for decentralized cloud-assisted storage
Alexandria Engineering Journal20 January 2023Volume 68 (Cover date: 1 April 2023)Pages 205-226
Dharavath RameshRahul MishraLianyong Qi
https://www.sciencedirect.com/science/article/pii/S1110016823000273/pdfft?md5=5aab1b2865d7beb5029f84823ebabd9e&pid=1-s2.0-S1110016823000273-main.pdf
25. Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health
Computer Standards & Interfaces19 October 2022Volume 84 (Cover date: March 2023)Article 103696
Huiyong WangJialing LiangYujue Wang
https://www.sciencedirect.com/science/article/pii/S0920548922000630/pdfft?md5=ff547c6b38cc6401aab84097bdefce06&pid=1-s2.0-S0920548922000630-main.pdf
26. A privacy-preserving blockchain-based tracing model for virus-infected people in cloud
Expert Systems with Applications18 August 2022Volume 211 (Cover date: January 2023)Article 118545
Chengyi QinLei WuHao Wang
https://www.sciencedirect.com/science/article/pii/S0957417422016165/pdfft?md5=98fe76d2b84854f3e88156f416e775d9&pid=1-s2.0-S0957417422016165-main.pdf
27. A security model to protect the isolation of medical data in the cloud using hybrid cryptography
Journal of Information Security and Applications10 January 2023Volume 73 (Cover date: March 2023) Article 103412
Swetha GaddeJ. AmutharajS. Usha
https://www.sciencedirect.com/science/article/pii/S2214212622002563/pdfft?md5=82f5dea8302e0f0145cdd931caa867c0&pid=1-s2.0-S2214212622002563-main.pdf
28. Secure-by-design serverless workflows on the Edge–Cloud Continuum through the Osmotic Computing paradigm
Internet of Things28 February 2023Volume 22 (Cover date: July 2023)Article 100737
Gabriele MorabitoChristian SicariLorenzo Carnevale
https://www.sciencedirect.com/science/article/pii/S2542660523000604/pdfft?md5=1dd8c96cd77b05bd05b3bd1becf40dba&pid=1-s2.0-S2542660523000604-main.pdf
29. IoT based medical image encryption using linear feedback shift register – Towards ensuring security for teleradiology applications
Measurement: Sensors12 January 2023Volume 25 (Cover date: February 2023)Article 100676
Siju JohnS. N. Kumar
https://www.sciencedirect.com/science/article/pii/S2665917423000120/pdfft?md5=b91983a45d1370351b9986bae93ccfdd&pid=1-s2.0-S2665917423000120-main.pdf
30. Improving intrusion detection in cloud-based healthcare using neural network
Biomedical Signal Processing and Control15 February 2023Volume 83 (Cover date: May 2023)Article 104680
Sagarkumar K. Patel
https://www.sciencedirect.com/science/article/pii/S1746809423001131/pdfft?md5=8b6f1ddf864b61180ad786b7efc02e70&pid=1-s2.0-S1746809423001131-main.pdf
31. DIVRS: Data integrity verification based on ring signature in cloud storage
Computers & Security2 November 2022Volume 124 (Cover date: January 2023)Article 103002
Miao TianYushu ZhangYong Xiang
https://www.sciencedirect.com/science/article/pii/S0167404822003947/pdfft?md5=4f1ee293913b5e00ed2ada148ae89b2f&pid=1-s2.0-S0167404822003947-main.pdf
32. Homomorphic cryptosystem-based secure data processing model for edge-assisted IoT healthcare systems
Internet of Things13 January 2023Volume 22 (Cover date: July 2023)Article 100693
Hiral S. TrivediSankita J. Patel
https://www.sciencedirect.com/science/article/pii/S2542660523000161/pdfft?md5=f28708aad5139b7ee8602cdca783a6be&pid=1-s2.0-S2542660523000161-main.pdf
33. PP–GSM: Privacy-preserving graphical security model for security assessment as a service
Future Generation Computer Systems16 January 2023Volume 142 (Cover date: May 2023)Pages 351-363
Dongwon LeeYongwoo OhDan Dongseong Kim
https://www.sciencedirect.com/science/article/pii/S0167739X22004459/pdfft?md5=3e0f6fbc4f6a04e7fd01b216d86ba83c&pid=1-s2.0-S0167739X22004459-main.pdf
34. A node trust evaluation method of vehicle-road-cloud collaborative system based on federated learning
Ad Hoc Networks3 October 2022Volume 138 (Cover date: 1 January 2023)Article 103013
Denghui WangYuping YiJunhui Zhao
https://www.sciencedirect.com/science/article/pii/S1570870522001858/pdfft?md5=ca11c931fa3e744650bd4b3f4604f48f&pid=1-s2.0-S1570870522001858-main.pdf
35. Security management of BYOD and cloud environment in Saudi Arabia
Alexandria Engineering Journal11 August 2022Volume 63 (Cover date: 15 January 2023)Pages 103-114
Khalid AlmarhabiAdel BahaddadAhmed Mohammed Alghamdi
https://www.sciencedirect.com/science/article/pii/S1110016822004896/pdfft?md5=b6581bb5e2e6bb848c8f4df9d8a9c166&pid=1-s2.0-S1110016822004896-main.pdf
36. Quorum controlled homomorphic re-encryption for privacy preserving computations in the cloud
Information Sciences21 November 2022Volume 621 (Cover date: April 2023)Pages 58-73
Zhe XiaQiliang YangFeng Feng
https://www.sciencedirect.com/science/article/pii/S0020025522013755/pdfft?md5=af5b83a06700228561e9e877d67e480b&pid=1-s2.0-S0020025522013755-main.pdf
37. An efficient, secure and verifiable conjunctive keyword search scheme based on rank metric codes over encrypted outsourced cloud data
Computers and Electrical Engineering16 December 2022Volume 105 (Cover date: January 2023)Article 108523
Vahid YousefipoorTaraneh Eghlidos
https://www.sciencedirect.com/science/article/pii/S0045790622007388/pdfft?md5=881750c354aefd5ae313de1bcb509534&pid=1-s2.0-S0045790622007388-main.pdf
38. Two-party interactive secure deduplication with efficient data ownership management in cloud storage
Journal of Information Security and Applications17 January 2023Volume 73 (Cover date: March 2023)Article 103426
Cheng GuoLitao WangGuofeng Zhang
https://www.sciencedirect.com/science/article/pii/S221421262300011X/pdfft?md5=53854c681e350a0fc520b32abb7d870f&pid=1-s2.0-S221421262300011X-main.pdf
39. A homomorphic approach for security and privacy preservation of Smart Airports
Future Generation Computer Systems6 December 2022Volume 141 (Cover date: April 2023)Pages 500-513
Haroon MalikShahzaib TahirFawad Khan
https://www.sciencedirect.com/science/article/pii/S0167739X22004101/pdfft?md5=e1f63449cdef160b4f8cc4117fa60ac9&pid=1-s2.0-S0167739X22004101-main.pdf
40. Privacy preserving via multi-key homomorphic encryption in cloud computing
Journal of Information Security and Applications9 March 2023Volume 74 (Cover date: May 2023)Article 103463
Xuelian LiHui LiRunsong Wang
https://www.sciencedirect.com/science/article/pii/S2214212623000479/pdfft?md5=2721ea09e2cd6fea9a2ec1d536ddb6ab&pid=1-s2.0-S2214212623000479-main.pdf
41. An effective and secured authentication and sharing of data with dynamic groups in cloud
Data & Knowledge Engineering17 December 2022Volume 145 (Cover date: May 2023)Article 102125
Dorababu SudarsaNagaraja Rao A.Sivakumar A.P.
https://www.sciencedirect.com/science/article/pii/S0169023X22001161/pdfft?md5=05be1f821c0f850f2cd8c949167aa792&pid=1-s2.0-S0169023X22001161-main.pdf
42. Secure data storage and access for fish monitoring in cloud environment
Measurement: SensorsAvailable online 14 February 2023In press, journal pre-proofArticle 100693
K. S. SaraswathyS. S. Sujatha
https://www.sciencedirect.com/science/article/pii/S2665917423000296/pdfft?md5=49b716b71b5336fd4760c6d0700e435a&pid=1-s2.0-S2665917423000296-main.pdf
43. A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things
Information Sciences20 December 2022Volume 623 (Cover date: April 2023)Pages 293-310
Mingwu ZhangMingxuan YangYuntao Wang
https://www.sciencedirect.com/science/article/pii/S0020025522015225/pdfft?md5=f6d25fe361f24257d02e6853f34bcd68&pid=1-s2.0-S0020025522015225-main.pdf
44. Cloud-based thermal error compensation with a federated learning approach
Precision Engineering6 October 2022Volume 79 (Cover date: January 2023)Pages 135-145
Fabian StoopJosef MayrKonrad Wegener
https://www.sciencedirect.com/science/article/pii/S0141635922002173/pdfft?md5=a8b0492bc60dda6f7504a94159292e22&pid=1-s2.0-S0141635922002173-main.pdf
45. Defense scheme against advanced persistent threats in mobile fog computing security
Computer Networks12 December 2022Volume 221 (Cover date: February 2023)Article 109519
Muhammad WaqasShanshan TuGhulam Abbas
https://www.sciencedirect.com/science/article/pii/S1389128622005539/pdfft?md5=38d9c0d521c53a460fee6b2a17fb046b&pid=1-s2.0-S1389128622005539-main.pdf
Nguồn: Cục Thông tin khoa học và công nghệ quốc gia, 5/5/2023