Cloud computing paradigm has been recognized recently as key enabling efficient and effective technological services that will reshape the delivery and support of the educational services. In this paper, we review the literature on cloud computing adoption by Higher Educational Institutions (HEIs) that were published during the period 2009 -2014. The motivation was to identify the main frameworks, models and architectures that were proposed for establishing cloud computing services inside HEIs. Furthermore, the review researched standard definitions and main characteristics, offered services and delivered models of cloud computing technology. It identified 133 papers that were published during the last six years and were focused on cloud computing adoption frameworks, models and architectures for HEIs. The review also provides a landscape of the research in this area and draws attention for more investigation in this field towards developing a comprehensive unified framework for the adoption of cloud computing services in HEIs.
The Internet of Medical Things (IoMT) has revolutionized the world of healthcare by remotely connecting patients to healthcare providers through medical devices connected over the Internet. IoMT devices collect patients’ medical data and share them with healthcare providers, who analyze it for early control of diseases. The security of patients’ data is of prime importance in IoMT. Authentication of users and devices is the first layer of security in IoMT. However, because of diverse and resource-constrained devices, authentication in IoMT is a challenging task. Several authentication schemes for IoMT have been proposed in the literature. However, each of them has its own pros and cons. To identify, evaluate and summarize the current literature on authentication in IoMT, we conducted a systematic review of 118 articles published between 2016 and 2021. We also established a taxonomy of authentication schemes in IoMT from seven different perspectives. We observed that most of the authentication schemes use a distributed architecture and public key infrastructure. It was also observed that hybrid cryptography approaches have become popular to overcome the shortcomings of single cryptographic approaches. Authentication schemes in IoMT need to support end-to-end, cross-layer, and cross-domain authentication. Finally, we discuss some open issues and future directions.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.