Privacy preservation models for third-party auditor over cloud computing: A survey
Cloud computing has become a prominent technology due to its important utility service; this
service concentrates on outsourcing data to organizations and individual consumers. Cloud …
service concentrates on outsourcing data to organizations and individual consumers. Cloud …
A study of moving from cloud computing to fog computing
HR Abdulqadir, SRM Zeebaree… - Qubahan Academic …, 2021 - journal.qubahan.com
The exponential growth of the Internet of Things (IoT) technology poses various challenges
to the classic centralized cloud computing paradigm, including high latency, limited capacity …
to the classic centralized cloud computing paradigm, including high latency, limited capacity …
Futuristic Cyber‐Twin Architecture for 6G Technology to Support Internet of Everything
With the rapid growth of Internet of Everything, there is a huge rise in the transportable
Internet traffic due to which its associated resources have exceptional obstacles which …
Internet traffic due to which its associated resources have exceptional obstacles which …
Data security in cloud computing using AES under HEROKU cloud
BH Lee, EK Dewi, MF Wajdi - 2018 27th wireless and optical …, 2018 - ieeexplore.ieee.org
Cloud security is an evolving sub-domain of computer and network security. Cloud platform
utilizes third-party data centers model. An example of cloud platform as a service (PaaS) is …
utilizes third-party data centers model. An example of cloud platform as a service (PaaS) is …
Securing data and preserving privacy in cloud IoT-based technologies an analysis of assessing threats and develo** effective safeguard
M Pathak, KN Mishra, SP Singh - Artificial Intelligence Review, 2024 - Springer
Abstract The Internet of Things (IoT) is a powerful technology adopted in various industries.
Applications of the IoT aim to enhance automation, productivity, and user comfort in a cloud …
Applications of the IoT aim to enhance automation, productivity, and user comfort in a cloud …
Detection and prevention mechanisms for ddos attack in cloud computing environment
For optimal use of cloud resources and to reduce the latency of cloud users, the cloud
computing model extends the services such as networking facilities, computational …
computing model extends the services such as networking facilities, computational …
[PDF][PDF] Cloud computing security challenges in higher educational institutions-A survey
Cloud Computing Security Challenges in Higher Educational Institutions - A Survey Page 1
International Journal of Computer Applications (0975 – 8887) Volume 161 – No 6, March 2017 …
International Journal of Computer Applications (0975 – 8887) Volume 161 – No 6, March 2017 …
A framework for critical security factors that influence the decision of cloud adoption by Saudi government agencies
Cloud computing technologies can play an essential role in public organisations and
companies while it reduces the cost of using information technology services. It allows users …
companies while it reduces the cost of using information technology services. It allows users …
Analytical review of data security in cloud computing
All the organization wants to implement the same security parameters as they are already
using with their internal data/resources. It is mandatory to understand and find the data …
using with their internal data/resources. It is mandatory to understand and find the data …
From cloud computing security towards homomorphic encryption: A comprehensive review
Abstract “Cloud computing” is a new technology that revolutionized the world of
communications and information technologies. It collects a large number of possibilities …
communications and information technologies. It collects a large number of possibilities …