Journal of Information Security,
Journal Year:
2024,
Volume and Issue:
15(02), P. 148 - 167
Published: Jan. 1, 2024
Cloud
computing
plays
a
significant
role
in
modern
information
technology,
providing
organizations
with
numerous
benefits,
including
flexibility,
scalability,
and
cost-efficiency.
However,
it
has
become
essential
for
to
ensure
the
security
of
their
applications,
data,
cloud-based
networks
use
cloud
services
effectively.
This
systematic
literature
review
aims
determine
latest
regarding
security,
specific
emphasis
on
threats
mitigation
strategies.
Additionally,
highlights
some
common
related
such
as
distributed
denial-of-service
(DDoS)
attacks,
account
hijacking,
malware
data
breaches.
research
also
explores
strategies,
awareness
training,
vulnerability
management,
event
management
(SIEM),
identity
access
(IAM),
encryption
techniques.
It
discusses
emerging
trends
integrating
artificial
intelligence
(AI)
machine
learning
(ML),
serverless
computing,
containerization,
well
effectiveness
shared
responsibility
model
its
challenges.
The
importance
user
impact
technologies
have
been
discussed
detail
mitigate
risks.
A
previous
scholarly
articles
conducted
provide
insights
security.
shows
need
continuous
innovation
address
maintain
security-conscious
culture
company.
Sensors,
Journal Year:
2023,
Volume and Issue:
23(13), P. 5970 - 5970
Published: June 27, 2023
Appropriate
maintenance
of
industrial
equipment
keeps
production
systems
in
good
health
and
ensures
the
stability
processes.
In
specific
sectors,
such
as
electrical
power
industry,
failures
are
rare
but
may
lead
to
high
costs
substantial
economic
losses
not
only
for
plant
consumers
larger
society.
Therefore,
industry
relies
on
a
variety
approaches
tasks,
ranging
from
traditional
solutions
engineering
know-how
smart,
AI-based
analytics
avoid
potential
downtimes.
This
review
shows
evolution
support
planning,
monitoring
supervision.
We
present
older
techniques
traditionally
used
tasks
those
that
rely
IT
automate
perform
inference
process
failure
detection.
analyze
prognostics
health-management
detail,
including
their
requirements,
advantages
limitations.
The
focuses
power-generation
sector.
However,
some
issues
addressed
common
other
industries.
article
also
presents
concepts
utilize
emerging
technologies
related
Industry
4.0,
touching
prescriptive
analysis,
Big
Data
Internet
Things.
primary
motivation
purpose
existing
practices
classic
methods
by
engineers,
well
modern
drawing
Artificial
Intelligence
concept
4.0.
summary
state
art
area
predictive
provides
two
benefits.
On
one
hand,
it
leads
improving
processes
matching
tools
methods.
researchers
directions
further
analysis
new
developments.
IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 3881 - 3897
Published: Jan. 1, 2024
As
reliance
on
disruptive
applications
based
Artificial
Intelligence
(AI)
and
Blockchain
grows,
the
need
for
secure
trustworthy
solutions
becomes
ever
more
critical.
Whereas
much
research
has
been
conducted
AI
Blockchain,
there
is
a
shortage
of
comprehensive
studies
examining
their
integration
from
security
perspective.
Hence,
this
survey
addresses
such
gap
provides
insights
policymakers,
researchers,
practitioners
exploiting
Blockchain's
evolving
integration.
Specifically,
paper
analyzes
potential
benefits
as
well
related
concerns,
identifying
possible
mitigation
strategies,
suggesting
regulatory
measures,
describing
impact
it
public
trust.
Advances in web technologies and engineering book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 1 - 26
Published: May 16, 2024
This
chapter
explores
the
integration
of
Semantic
Web
control
models,
innovation,
and
security
in
cloud
computing,
especially
context
AIoT
integration.
The
provides
machine-understandable
data
offers
sophisticated
models
that
enhance
innovation
environments.
Technologies
like
RDF,
OWL,
SPARQL
enable
semantic
interoperability,
while
focus
on
access
mechanisms
authentication
strategies.
introduces
concept
AIoT,
integrating
AI
with
IoT
devices
discusses
potential
managing
risks
fostering
innovation.
Digital engineering.,
Journal Year:
2024,
Volume and Issue:
2, P. 100013 - 100013
Published: Aug. 1, 2024
Since
the
concept
of
Industry
5.0
was
proposed,
emphasis
on
human–machine
interaction
(HMI)
in
industrial
scenarios
has
continued
to
increase.
HMI
is
part
factory's
development
towards
5.0,
mainly
because
can
help
realise
human-centric
vision.
At
same
time,
achieve
sustainable
and
resilient
goals
proposed
by
green,
smart,
more
advanced
technologies
are
also
considered
important
driving
factors
for
factories
5.0.
Human-centric
smart
manufacturing
(HCSM)
that
integrate
with
expected
become
paradigm
future
manufacturing.
Therefore,
it
necessary
discuss
research
directions
may
promote
implementation
HCSM
future.
In
a
factory,
signals
will
go
through
process
being
collected
sensors,
processed,
transmitted
data
analysis
centre
output
complete
interaction.
Based
this
process,
we
divide
into
four
parts:
sensor
hardware,
processing,
transmission
mechanism,
collaboration.
Through
systematic
literature
review
article
evaluates
summarises
current
field
categorises
them
parts
process.
usage
some
relatively
limited,
introduction
focuses
possible
applications
problems
they
face.
Finally,
opportunities
challenges
revealed
discussed.
Sensors,
Journal Year:
2022,
Volume and Issue:
22(7), P. 2445 - 2445
Published: March 22, 2022
This
article
presents
the
results
of
research
with
main
goal
identifying
possible
applications
edge
computing
(EC)
in
industry.
study
used
methodology
systematic
literature
review
and
text
mining
analysis.
The
findings
showed
that
primary
EC
is
to
reduce
time
required
transfer
large
amounts
data.
With
ability
analyze
data
at
edge,
it
obtain
immediate
feedback
use
decision-making
process.
However,
implementation
requires
investments
not
only
infrastructure,
but
also
development
employee
knowledge
related
modern
methods
based
on
artificial
intelligence.
As
analyses
showed,
great
importance
attached
energy
consumption,
both
ongoing
production
processes
for
purposes
transmission
paper
highlights
problems
quality
management.
Based
analyses,
we
indicate
further
directions
application
associated
technologies
are
area
intelligent
resource
scheduling
(for
flexible
systems
autonomous
systems),
anomaly
detection
resulting
decision
making,
analysis
transfer,
management
smart
designing),
simulations
systems).
European Journal of Innovation Management,
Journal Year:
2023,
Volume and Issue:
unknown
Published: Aug. 1, 2023
Purpose
The
data
economy,
emerging
from
the
current
hyper-technological
landscape,
is
a
global
digital
ecosystem
where
gathered,
organized
and
exchanged
to
create
economic
value.
This
paper
aims
shed
light
on
interplay
of
different
topics
involved
in
as
found
literature.
study
research
provides
comprehensive
understanding
opportunities,
challenges
implications
economy
for
businesses,
governments,
individuals
society
at
large,
while
investigating
its
impact
business
value
creation,
knowledge
transformation.
Design/methodology/approach
authors
conducted
literature
review
that
generated
conceptual
map
by
analyzing
corpus
papers
through
combination
machine
learning
algorithms,
text
mining
techniques
qualitative
approach.
Findings
findings
revealed
eight
collectively
represent
essential
features
literature,
namely
(1)
Data
Security,
(2)
Technology
Enablers,
(3)
Business
Implications,
(4)
Social
(5)
Political
Framework,
(6)
Legal
(7)
Privacy
Concerns
(8)
Marketplace.
resulting
model
may
help
researchers
practitioners
develop
concept
structured
way
provide
subset
specific
areas
require
further
exploration.
Practical
Practically,
this
offers
managers
marketers
valuable
insights
comprehend
how
manage
opportunities
deriving
constantly
changing
competitive
arena
whose
today
also
economy.
Socially,
reveal
explaining
be
exploited
build
better
society.
Originality/value
first
exploring
opportunity
creation
critical
perspective.
Journal of Cloud Computing Advances Systems and Applications,
Journal Year:
2023,
Volume and Issue:
12(1)
Published: Jan. 23, 2023
Abstract
There
is
an
increase
in
cyberattacks
directed
at
the
network
behind
firewalls.
An
all-inclusive
approach
proposed
this
assessment
to
deal
with
problem
of
identifying
new,
complicated
threats
and
appropriate
countermeasures.
In
particular,
zero-day
attacks
multi-step
assaults,
which
are
made
up
a
number
different
phases,
some
malicious
others
benign,
illustrate
well.
paper,
we
propose
highly
Boosted
Neural
Network
detect
multi-stageattack
scenario.
This
paper
demonstrated
results
executing
various
machine
learning
algorithms
enormously
boosted
neural
network.
The
accuracy
level
achieved
prediction
multi-stage
cyber
94.09%
(Quest
Model),
97.29%
(Bayesian
Network),
99.09%
(Neural
Network).
evaluation
Multi-Step
Cyber-Attack
Dataset
(MSCAD)
show
that
Extremely
can
predict
attack
99.72%
accuracy.
Such
accurate
plays
vital
role
managing
real-time
communication.
IEEE Access,
Journal Year:
2023,
Volume and Issue:
11, P. 46561 - 46576
Published: Jan. 1, 2023
Because
of
the
recent
exponential
rise
in
attack
frequency
and
sophistication,
proliferation
smart
things
has
created
significant
cybersecurity
challenges.
Even
though
tremendous
changes
cloud
computing
brought
to
business
world,
its
centralization
makes
it
challenging
use
distributed
services
like
security
systems.
Valuable
data
breaches
might
occur
due
high
volume
that
moves
between
businesses
service
suppliers,
both
accidental
malicious.
The
malicious
insider
becomes
a
crucial
threat
organization
since
they
have
more
access
opportunity
produce
damage.
Unlike
outsiders,
insiders
possess
privileged
proper
information
resources.
In
this
work,
machine
learning-based
system
for
detection
classification
is
proposed
developed
systematic
approach
identify
various
anomalous
occurrences
may
point
anomalies
problems
associated
with
privilege
escalation.
By
combining
many
models,
ensemble
learning
enhances
outcomes
enables
greater
prediction
performance.
Multiple
studies
been
presented
regarding
detecting
irregularities
vulnerabilities
network
systems
find
flaws
or
threats
involving
But
these
lack
identification
attacks.
This
study
proposes
evaluates
ensembles
Machine
(ML)
techniques
context.
paper
implements
algorithms
A
customized
dataset
from
multiple
files
CERT
used.
Four
algorithms,
i.e.,
Random
Forest
(RF),
Adaboost,
XGBoost,
LightGBM,
are
applied
analyzed
results.
Overall,
LightGBM
performed
best.
However,
some
other
such
as
RF
AdaBoost,
perform
better
on
internal
attacks
(Behavioral
Biometrics
attacks)
Therefore,
there
room
incorporating
than
one
algorithm
obtain
stronger
Among
provides
highest
accuracy
97%;
values
at
86%,
AdaBoost
88%,
XGBoost
88.27%.
International Journal of Emerging Multidisciplinaries Computer Science & Artificial Intelligence,
Journal Year:
2023,
Volume and Issue:
2(1)
Published: Nov. 14, 2023
Cloud
computing
and
IoT
security
are
pivotal
technologies
that
have
reshaped
the
IT
landscape.
Leading
tech
giants
like
Google,
Microsoft,
Amazon
harnessed
their
potential,
continually
enhancing
these
services.
Despite
increasing
user
bases,
face
significant
hurdles,
with
emerging
as
foremost
challenge.
This
paper
delves
into
aspects
of
both
cloud
services,
encompassing
components,
processes,
threats,
real-world
examples
security-related
technologies.
We
also
explore
impacts,
including
benefits,
limitations,
future
potential
In
our
exploration,
we
define
Internet
Things
(IoT)
to
provide
a
foundational
understanding
then
investigate
applications,
highlighting
relevance
ubiquity
in
various
domains.
The
core
this
revolves
around
discussion
issues
IoT.
For
IoT,
dissect
offering
technology
illustrate
significance.
Similarly,
for
computing,
delve
its
threats
while
showcasing
practical
applications
impact
section
assesses
benefits
security.
It
candidly
addresses
issues,
challenges
associated
technologies,
insights
advancements.
comprehensive
study
underscores
significance
domains
valuable
resource
practitioners
researchers.
As
continue
evolve,
implications
is
crucial
harnessing
full
potential.
Sensors,
Journal Year:
2024,
Volume and Issue:
24(2), P. 433 - 433
Published: Jan. 10, 2024
Cloud
computing
technology
is
rapidly
becoming
ubiquitous
and
indispensable.
However,
its
widespread
adoption
also
exposes
organizations
individuals
to
a
broad
spectrum
of
potential
threats.
Despite
the
multiple
advantages
cloud
offers,
remain
cautious
about
migrating
their
data
applications
due
fears
breaches
security
compromises.
In
light
these
concerns,
this
study
has
conducted
an
in-depth
examination
variety
articles
enhance
comprehension
challenges
related
safeguarding
fortifying
within
environment.
Furthermore,
research
scrutinized
several
well-documented
breaches,
analyzing
financial
consequences
they
inflicted.
Additionally,
it
scrutinizes
distinctions
between
conventional
digital
forensics
forensic
procedures
specific
computing.
As
result
investigation,
concluded
by
proposing
opportunities
for
further
in
critical
domain.
By
doing
so,
contributes
our
collective
understanding
complex
panorama
protection
security,
while
acknowledging
evolving
nature
need
ongoing
exploration
innovation
field.
This
helps
compound
annual
growth
rate
(CAGR)
forensics,
which
found
be
quite
high
at
≈16.53%
from
2023
2031.
Moreover,
market
expected
reach
≈USD
36.9
billion
year
2031;
presently,
11.21
billion,
shows
that
there
are
great
investment
area.
strategically
addresses
emerging
providing
comprehensive
approach
navigating
overcoming
complexities
associated
with
landscape