A systematic review on game-theoretic models and different types of security requirements in cloud environment: challenges and opportunities

KS Gill, A Sharma, S Saxena - Archives of Computational Methods in …, 2024 - Springer
The presented survey paper explores the application of game theoretic models for
addressing security challenges in cloud computing environments. It highlights the …

Information security risk assessment methods in cloud computing: Comprehensive review

T Ali, M Al-Khalidi, R Al-Zaidi - Journal of Computer Information …, 2024 - Taylor & Francis
Cloud computing faces more security threats, requiring better security measures. This paper
examines the various classification and categorization schemes for cloud computing security …

[PDF][PDF] Cybercrime Unmasked: Investigating cases and digital evidence

H Azam, MI Dulloo, MH Majeed… - … Science & Artificial …, 2023 - pdfs.semanticscholar.org
The advent of rapid digital technology has opened doors to a new domain for criminal
activities, commonly termed as computer crimes. Stringent penalties have been instituted by …

Swarm Intelligence with a Chaotic Leader and a Salp algorithm: HDFS optimization for reduced latency and enhanced availability

N Jagadish Kumar, D Dhinakaran… - Concurrency and …, 2024 - Wiley Online Library
The Hadoop distributed file system (HDFS) effectively manages data by segmenting it into
blocks distributed across DataNodes in its cluster. While default block sizes in Hadoop 2. x …

Confimizer: A novel algorithm to optimize cloud resource by confidentiality-cost trade-off using bilstm network

S Achar, N Faruqui, A Bodepudi, M Reddy - IEEE Access, 2023 - ieeexplore.ieee.org
The world is expiring a 23% annual data growth rate and is projected to have a total surplus
volume of 175 Zettabytes by 2025. It imposes significant challenges for small to medium …

Designing anonymous key agreement scheme for secure vehicular ad-hoc networks

M Ismail, S Chatterjee, JK Sing… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Presently, the Vehicular Ad-hoc Network (VANET) is very important for the entire traffic
management system. The 5th Generation (5G) enables VANET and Intelligent …

[HTML][HTML] Efficient resource utilization in IoT and cloud computing

VK Prasad, D Dansana, MD Bhavsar, B Acharya… - Information, 2023 - mdpi.com
With the proliferation of IoT devices, there has been exponential growth in data generation,
placing substantial demands on both cloud computing (CC) and internet infrastructure. CC …

Fog computing security: A review

AK Jumani, J Shi, AA Laghari, Z Hu, A Nabi… - Security and …, 2023 - Wiley Online Library
Fog computing, also known as edge computing, is a decentralized computing architecture
that brings computing and data storage closer to the users and devices that need it. It offers …

An Efficient Multi-User Groupwise Integrity CP-ABE (GI-CPABE) for Homogeneous and Heterogeneous Cloud Blockchain Transactions.

K Sravanthi, P Chandrasekhar - Journal of Electrical …, 2024 - search.ebscohost.com
As the size of medical data grows exponentially, safeguarding Electronic Health Records
(EHR) via cloud blockchain transactions becomes increasingly critical. This paper presents …

Revisiting of peer-to-peer traffic: taxonomy, applications, identification techniques, new trends and challenges

MSA Ansari, K Pal, MC Govil - Knowledge and Information Systems, 2023 - Springer
The services provided through peer-to-peer (P2P) architecture involve the transmission of
text, images, documents, and multimedia. Especially the distribution of multimedia content …