A systematic survey on energy-efficient techniques in sustainable cloud computing
Global warming is one of the most compelling environmental threats today, as the rise in
energy consumption and CO2 emission caused a dreadful impact on our environment. The …
energy consumption and CO2 emission caused a dreadful impact on our environment. The …
Cloud security issues and challenges: A survey
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …
amount of virtual storage. The main features of cloud computing is that the user does not …
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …
to grow further with the improved technological innovations. However, the associated …
Issues and challenges of load balancing techniques in cloud computing: A survey
With the growth in computing technologies, cloud computing has added a new paradigm to
user services that allows accessing Information Technology services on the basis of pay-per …
user services that allows accessing Information Technology services on the basis of pay-per …
A survey on cloud computing security: Issues, threats, and solutions
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand
services to consumers with greater flexibility in a cost effective manner. While moving …
services to consumers with greater flexibility in a cost effective manner. While moving …
Security in cloud computing: Opportunities and challenges
The cloud computing exhibits, remarkable potential to provide cost effective, easy to
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …
Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues
With the increasing utilization of the Internet and its provided services, an increase in cyber-
attacks to exploit the information occurs. A technology to store and maintain user's …
attacks to exploit the information occurs. A technology to store and maintain user's …
Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey
The cloud phenomenon is quickly becoming an important service in Internet computing.
Infrastructure as a Service (IaaS) in cloud computing is one of the most significant and …
Infrastructure as a Service (IaaS) in cloud computing is one of the most significant and …
A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography
Nowadays, telemedicine is an emerging healthcare service where the healthcare
professionals can diagnose, evaluate, and treat a patient using telecommunication …
professionals can diagnose, evaluate, and treat a patient using telecommunication …
An overview of virtual machine placement schemes in cloud computing
Abstract In cloud computing, Virtual Machine (VM) placement is a critical operation which is
conducted as part of the VM migration and aimed to find the best Physical Machine (PM) to …
conducted as part of the VM migration and aimed to find the best Physical Machine (PM) to …