Multi-layered access control based auto tuning relational key implications in enterprise-level multi-tenancy

SK Henge, R Rajakumar, P Prasanna… - Multimedia Tools and …, 2024 - Springer
This article discusses the importance of cloud-based multi-tenancy in private–public-private
secure cloud environments, which is achieved through the isolation of end-user data and …

[PDF][PDF] Machine learning-based network intrusion detection: Performance evaluation and comparative analysis

B Kumari, V Singh, M Kumar - … .s3.ap-south-1.amazonaws.com
Intrusion detection systems are used to investigate malicious behavior that takes place
within a system or network. Programming or equipment utilized for interruption identification …

[PDF][PDF] Secure data encryption key scenario for protecting private data security and privacy

A Pradesh - … .s3.ap-south-1.amazonaws.com
Cryptography, specifically encryption, plays a pivotal role in protecting data from
unauthorized access. However, not all encryption methods are equally effective, as some …

[PDF][PDF] Security issues in cloud, fog and edge computing models and suggested solutions

K Kumar, DK Saini - … .s3.ap-south-1.amazonaws.com
This investigation on data and information security in cloud, fog and edge computing
explores the essential security challenges and solutions in all three computing paradigms …