Search
Search Results
-
Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability
Cloud computing provides outsourcing of computing services at a lower cost, making it a popular choice for many businesses. In recent years, cloud...
-
A Novel Approach to Privacy Preservation on E-Healthcare Data in a Cloud Environment
Cloud environment enables healthcare professionals to work together. Despite its many benefits, it faces several difficulties: technical, legal, and... -
Simplified Image Encryption Algorithm (SIEA) to enhance image security in cloud storage
Cloud computing is a domain that provides the on-demand availability of IT resources, which can be accessed from a remote server over the internet. A...
-
Cloud Security
The objective of this chapter is present security-related concepts in the cloud. The reader will understand how security is provided in different... -
Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing
Advanced technology of Cloud Computing (CC) is to provide the services without straight executive of users and demand for resources. It is very...
-
Emulation of point cloud streaming over 5G network
Realistic digital representations of three dimensions (3D) objects and environments are now achievable because to recent developments in computer...
-
Password based authentication for web based graphics computing services retrieval in cloud
In the global environment privacy and security issues were critical to handle the huge number of participants. Many security-based research works...
-
CryptoHHO: a bio-inspired cryptosystem for data security in Fog–Cloud architecture
The exponential growth of Internet-of-Things (IoT) has raised several data security risks to the Fog–Cloud architecture. The performance and the...
-
Generative AI Cloud Platforms
In Chapter 5 , we examined how various providers of generative AI software compete for customers and... -
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services
The large-scale deployment of cloud composite services distributed over heterogeneous environments poses new challenges in terms of security...
-
Provably secure data selective sharing scheme with cloud-based decentralized trust management systems
The smart collection and sharing of data is an important part of cloud-based systems, since huge amounts of data are being created all the time. This...
-
Deep learning approach to security enforcement in cloud workflow orchestration
Supporting security and data privacy in cloud workflows has attracted significant research attention. For example, private patients’ data managed by...
-
Anomaly Detection in Cloud Computing using Knowledge Graph Embedding and Machine Learning Mechanisms
The orchestration of cloud computing infrastructures is challenging, considering the number, heterogeneity and dynamicity of the involved resources,...
-
A hybrid lightweight blockchain based encryption scheme for security enhancement in cloud computing
Cloud services provide an optimal form of demand based data outsourcing. The large amount of user data sharing increases the possibility of attacks,...
-
Autonomic edge cloud assisted framework for heart disease prediction using RF-LRG algorithm
Due to changing lifestyles, human physical exercise has dropped rapidly which leads to several health-related problems. It is not easy to detect...
-
Influence of structural factors on employee cloud shadow IT usage during COVID-19 lockdown: a strain theory perspective
Cloud shadow information technology (SIT) usage is a deviant behavior among employees evidenced in the initiation and completion of official tasks...
-
BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud
Cloud computing technology offers flexible and expedient services that carry a variety of profits for both societies as well as individuals....
-
Admission control policy and key agreement based on anonymous identity in cloud computing
Cloud computing has completely revolutionized the concept of computing by providing users with always-accessible resources. In terms of...
-
Spring Cloud with Spring Boot
Spring Cloud is a framework within the Spring ecosystem that provides tools and libraries to simplify the development of distributed systems,... -
A 4D strong spatio-temporal feature learning network for behavior recognition of point cloud sequences
Although the depth map sequence widely used in behavior recognition can provide depth information. However, depth pixels are not strongly correlated...