Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices

Mostafa Chegenizadeh; Mohammad Ali; Javad Mohajeri; Mohammad Reza Aref

Volume 16, Issue 1 , January 2024, , Pages 93-114

https://doi.org/10.22042/isecure.2023.395028.954

Abstract
  Attribute-based encryption (ABE) is a promising cryptographic mechanism for providing confidentiality and fine-grained access control in the cloud-based area.However, due to high computational overhead, common ABE schemes are not suitable for resource-constrained devices.Additionally, access policies ...  Read More

Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting

Danial Shiraly; Nasrollah Pakniat; Ziba Eslami

Volume 15, Issue 3 , October 2023, , Pages 1-17

https://doi.org/10.22042/isecure.2023.416676.1014

Abstract
  Public key encryption with keyword search (PEKS) is a cryptographic primitive designed for performing secure search operations over encrypted data stored on untrusted cloud servers. However, in some applications of cloud computing, there is a hierarchical access-privilege setup among users so that upper-level ...  Read More

Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems

Mohammad Ali

Volume 14, Issue 3 , October 2022, , Pages 43-49

https://doi.org/10.22042/isecure.2022.0.0.0

Abstract
  Remote data auditing (RDA) protocols enable a cloud server to persuade an auditor that it is storing a data file honestly. Unlike digital signature(DS) schemes, in RDA protocols, the auditor can carry out the auditing procedure without having the entire data file. Therefore, RDA protocols seem to be ...  Read More

Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics

Wedad Alawad; Awatef Balobaid

Volume 13, Issue 3 , November 2021, , Pages 49-57

https://doi.org/10.22042/isecure.2021.0.0.0

Abstract
  Digital forensics is a process of uncovering and exploring evidence from digital content. A growth in digital data in recent years has made it challenging for forensic investigators to uncover useful information. Moreover, the applied use of cloud computing has increased significantly in past few years ...  Read More

Knowledge Discovery in Cloud-Computing Environment and the Challenges

Najah K. Almazmomi

Volume 12, Issue 3 , November 2020, , Pages 95-99

https://doi.org/10.22042/isecure.2021.273750.640

Abstract
  Today, in the area of telecommunication, social media, the internet of things (IoT), and the virtual world, enormous amounts of data are being generated which are extracted to discover knowledge. Knowledge discovery from data in the cloud-computing environment entails the extraction of the new and necessary ...  Read More

Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS)

Tahir Alyas; Gulzar Ahmad; Yousaf Saeed; Muhammad Asif; Umer Farooq; Asma Kanwal

Volume 11, Issue 3 , August 2019, , Pages 153-160

https://doi.org/10.22042/isecure.2019.11.0.20

Abstract
  Internet of Things (IoT) and cloud computing technologies have connected the infrastructure of the city to make the context-aware and more intelligent city for utility its major resources. These technologies have much potential to solve thechallenges of urban areas around the globe to facilitate ...  Read More

IoT Protocols Based Fog/Cloud over High Traffic

Istabraq M. Al-Joboury; Emad H. Al-Hemiary

Volume 11, Issue 3 , August 2019, , Pages 173-180

https://doi.org/10.22042/isecure.2019.11.3.23

Abstract
  The Internet of Things (IoT) becomes the future of a global data field in which the embedded devices communicate with each other, exchange data and making decisions through the Internet. IoT could improve the quality of life in smart cities, but a massive amount of data from different smart devices could ...  Read More

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

Javad Ghareh Chamani; Mohammad Sadeq Dousti; Rasool Jalili; Dimitrios Papadopoulos

Volume 11, Issue 1 , January 2019, , Pages 15-34

https://doi.org/10.22042/isecure.2019.148637.430

Abstract
  While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called ...  Read More

A risk model for cloud processes

E. Damiani; S. Cimato; G. Gianini

Volume 6, Issue 2 , July 2014, , Pages 99-123

https://doi.org/10.22042/isecure.2015.6.2.2

Abstract
  Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to ...  Read More