Hybrid cryptography algorithms in cloud computing: A review
it's observed that most people and firms are migrating to the cloud, because the cloud is
much cheaper and convenient. For some computer owners, finding enough storage space to …
much cheaper and convenient. For some computer owners, finding enough storage space to …
Big data security and privacy: Current challenges and future research perspective in cloud environment
Cloud computing is an Internet-based technology that emerging rapidly in the last few years
due to popular and demanded services required by various institutions, organizations, and …
due to popular and demanded services required by various institutions, organizations, and …
Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security
For the cloud security or intrusion detection system (IDS) an effective scheme for prediction
and privacy preservation is employed with the use of enhanced Honeypot algorithm. At first …
and privacy preservation is employed with the use of enhanced Honeypot algorithm. At first …
Securing data and preserving privacy in cloud IoT-based technologies an analysis of assessing threats and develo** effective safeguard
M Pathak, KN Mishra, SP Singh - Artificial Intelligence Review, 2024 - Springer
Abstract The Internet of Things (IoT) is a powerful technology adopted in various industries.
Applications of the IoT aim to enhance automation, productivity, and user comfort in a cloud …
Applications of the IoT aim to enhance automation, productivity, and user comfort in a cloud …
Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme
The amount of data generated by electronic systems through e-commerce, social networks,
and data computation has risen. However, the security of data has always been a challenge …
and data computation has risen. However, the security of data has always been a challenge …
[PDF][PDF] An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms.
Many symmetric and asymmetric encryption algorithms have been developed in cloud
computing to transmit data in a secure form. Cloud cryptography is a data encryption …
computing to transmit data in a secure form. Cloud cryptography is a data encryption …
[PDF][PDF] Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.
SS Pericherla - ISC Int. J. Inf. Secur., 2023 - researchgate.net
Cloud computing created a revolution in the way IT organizations and IT teams manage their
internal digital resources and workloads. One major drawback or limitation of cloud …
internal digital resources and workloads. One major drawback or limitation of cloud …
[PDF][PDF] Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks.
Many organizations have insisted on protecting the cloud server from the outside, although
the risks of attacking the cloud server are mostly from the inside. There are many algorithms …
the risks of attacking the cloud server are mostly from the inside. There are many algorithms …
Enabling blockchain-assisted certificateless public integrity checking for industrial cloud storage systems
Q Liu, X Zhang, J Xue, R Zhou, X Wang… - Journal of Systems …, 2023 - Elsevier
Due to the sharp increase in industrial data, cloud computing has been integrated into
intelligent Industrial Internet of Things systems to store and process massive data. Since …
intelligent Industrial Internet of Things systems to store and process massive data. Since …
Introduction to virtualization in cloud computing
Everything about today's everyday life is digitally interactive. The Internet offers access to a
huge amount of information. The Internet is the world's largest network for gaining free …
huge amount of information. The Internet is the world's largest network for gaining free …