Hybrid cryptography algorithms in cloud computing: A review

SA Ahmad, AB Garko - 2019 15th International conference on …, 2019 - ieeexplore.ieee.org
it's observed that most people and firms are migrating to the cloud, because the cloud is
much cheaper and convenient. For some computer owners, finding enough storage space to …

Big data security and privacy: Current challenges and future research perspective in cloud environment

S Riaz, AH Khan, M Haroon, S Latif… - 2020 International …, 2020 - ieeexplore.ieee.org
Cloud computing is an Internet-based technology that emerging rapidly in the last few years
due to popular and demanded services required by various institutions, organizations, and …

Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security

A Mondal, RT Goswami - Microprocessors and Microsystems, 2021 - Elsevier
For the cloud security or intrusion detection system (IDS) an effective scheme for prediction
and privacy preservation is employed with the use of enhanced Honeypot algorithm. At first …

Securing data and preserving privacy in cloud IoT-based technologies an analysis of assessing threats and develo** effective safeguard

M Pathak, KN Mishra, SP Singh - Artificial Intelligence Review, 2024 - Springer
Abstract The Internet of Things (IoT) is a powerful technology adopted in various industries.
Applications of the IoT aim to enhance automation, productivity, and user comfort in a cloud …

Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme

JK Dawson, F Twum, JB Hayfron Acquah, YM Missah - Plos one, 2023 - journals.plos.org
The amount of data generated by electronic systems through e-commerce, social networks,
and data computation has risen. However, the security of data has always been a challenge …

[PDF][PDF] An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms.

M Nadeem, A Arshad, S Riaz, SW Zahra… - … , Materials & Continua, 2023 - researchgate.net
Many symmetric and asymmetric encryption algorithms have been developed in cloud
computing to transmit data in a secure form. Cloud cryptography is a data encryption …

[PDF][PDF] Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.

SS Pericherla - ISC Int. J. Inf. Secur., 2023 - researchgate.net
Cloud computing created a revolution in the way IT organizations and IT teams manage their
internal digital resources and workloads. One major drawback or limitation of cloud …

[PDF][PDF] Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks.

M Nadeem, A Arshad, S Riaz, SW Zahra… - … , Materials & Continua, 2023 - researchgate.net
Many organizations have insisted on protecting the cloud server from the outside, although
the risks of attacking the cloud server are mostly from the inside. There are many algorithms …

Enabling blockchain-assisted certificateless public integrity checking for industrial cloud storage systems

Q Liu, X Zhang, J Xue, R Zhou, X Wang… - Journal of Systems …, 2023 - Elsevier
Due to the sharp increase in industrial data, cloud computing has been integrated into
intelligent Industrial Internet of Things systems to store and process massive data. Since …

Introduction to virtualization in cloud computing

VK Sharma, A Singh, KR Jaya, AK Bairwa… - … for Optimization in …, 2022 - taylorfrancis.com
Everything about today's everyday life is digitally interactive. The Internet offers access to a
huge amount of information. The Internet is the world's largest network for gaining free …