We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 10,000 results
  1. Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability

    Cloud computing provides outsourcing of computing services at a lower cost, making it a popular choice for many businesses. In recent years, cloud...

    Paromita Goswami, Neetu Faujdar, ... Ghanshyam Singh in Journal of Cloud Computing
    Article Open access 15 February 2024
  2. A Novel Approach to Privacy Preservation on E-Healthcare Data in a Cloud Environment

    Cloud environment enables healthcare professionals to work together. Despite its many benefits, it faces several difficulties: technical, legal, and...
    Kirtirajsinh Zala, Madhu Shukla in Smart Trends in Computing and Communications
    Conference paper 2023
  3. Simplified Image Encryption Algorithm (SIEA) to enhance image security in cloud storage

    Cloud computing is a domain that provides the on-demand availability of IT resources, which can be accessed from a remote server over the internet. A...

    M. Lavanya, K. Joseph Abraham Sundar, S. Saravanan in Multimedia Tools and Applications
    Article 06 January 2024
  4. Cloud Security

    The objective of this chapter is present security-related concepts in the cloud. The reader will understand how security is provided in different...
    Chellammal Surianarayanan, Pethuru Raj Chelliah in Essentials of Cloud Computing
    Chapter 2023
  5. Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing

    Advanced technology of Cloud Computing (CC) is to provide the services without straight executive of users and demand for resources. It is very...

    S. Radha, S. Jeyalaksshmi in SN Computer Science
    Article 14 October 2023
  6. Emulation of point cloud streaming over 5G network

    Realistic digital representations of three dimensions (3D) objects and environments are now achievable because to recent developments in computer...

    Estabraq H. Makiyah, Nassr N. Khamees in International Journal of Information Technology
    Article 15 February 2024
  7. Password based authentication for web based graphics computing services retrieval in cloud

    In the global environment privacy and security issues were critical to handle the huge number of participants. Many security-based research works...

    Eman S. Alkhalifah in Multimedia Tools and Applications
    Article 19 April 2024
  8. CryptoHHO: a bio-inspired cryptosystem for data security in Fog–Cloud architecture

    The exponential growth of Internet-of-Things (IoT) has raised several data security risks to the Fog–Cloud architecture. The performance and the...

    Md Saquib Jawed, Mohammad Sajid in The Journal of Supercomputing
    Article 06 April 2024
  9. Generative AI Cloud Platforms

    In Chapter 5 , we examined how various providers of generative AI software compete for customers and...
    Peter Cohan in Brain Rush
    Chapter 2024
  10. C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services

    The large-scale deployment of cloud composite services distributed over heterogeneous environments poses new challenges in terms of security...

    Mohamed Oulaaffart, RĂ©mi Badonnel, Olivier Festor in Journal of Network and Systems Management
    Article 05 January 2024
  11. Provably secure data selective sharing scheme with cloud-based decentralized trust management systems

    The smart collection and sharing of data is an important part of cloud-based systems, since huge amounts of data are being created all the time. This...

    S. Velmurugan, M. Prakash, ... Arun Radhakrishnan in Journal of Cloud Computing
    Article Open access 10 April 2024
  12. Deep learning approach to security enforcement in cloud workflow orchestration

    Supporting security and data privacy in cloud workflows has attracted significant research attention. For example, private patients’ data managed by...

    Hadeel T. El-Kassabi, Mohamed Adel Serhani, ... Khaled Khalil in Journal of Cloud Computing
    Article Open access 18 January 2023
  13. Anomaly Detection in Cloud Computing using Knowledge Graph Embedding and Machine Learning Mechanisms

    The orchestration of cloud computing infrastructures is challenging, considering the number, heterogeneity and dynamicity of the involved resources,...

    Katerina Mitropoulou, Panagiotis Kokkinos, ... Emmanouel Varvarigos in Journal of Grid Computing
    Article Open access 29 December 2023
  14. A hybrid lightweight blockchain based encryption scheme for security enhancement in cloud computing

    Cloud services provide an optimal form of demand based data outsourcing. The large amount of user data sharing increases the possibility of attacks,...

    Pranav Shrivastava, Bashir Alam, Mansaf Alam in Multimedia Tools and Applications
    Article 27 September 2023
  15. Autonomic edge cloud assisted framework for heart disease prediction using RF-LRG algorithm

    Due to changing lifestyles, human physical exercise has dropped rapidly which leads to several health-related problems. It is not easy to detect...

    Mohit Kumar, Atul Rai, ... Neeraj Kumar in Multimedia Tools and Applications
    Article 29 May 2023
  16. Influence of structural factors on employee cloud shadow IT usage during COVID-19 lockdown: a strain theory perspective

    Cloud shadow information technology (SIT) usage is a deviant behavior among employees evidenced in the initiation and completion of official tasks...

    Fowokemi Alaba Ogedengbe, Yurita Yakimin Abdul Talib, Fariza Hanim Rusly in Cognition, Technology & Work
    Article 16 December 2023
  17. BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud

    Cloud computing technology offers flexible and expedient services that carry a variety of profits for both societies as well as individuals....

    M. Pavithra, M. Prakash, V. Vennila in Journal of Cloud Computing
    Article Open access 05 January 2024
  18. Admission control policy and key agreement based on anonymous identity in cloud computing

    Cloud computing has completely revolutionized the concept of computing by providing users with always-accessible resources. In terms of...

    D. Paulraj, S. Neelakandan, ... E. Baburaj in Journal of Cloud Computing
    Article Open access 04 May 2023
  19. Spring Cloud with Spring Boot

    Spring Cloud is a framework within the Spring ecosystem that provides tools and libraries to simplify the development of distributed systems,...
    Felipe Gutierrez in Pro Spring Boot 3
    Chapter 2024
  20. A 4D strong spatio-temporal feature learning network for behavior recognition of point cloud sequences

    Although the depth map sequence widely used in behavior recognition can provide depth information. However, depth pixels are not strongly correlated...

    Kaijun You, Zhenjie Hou, ... Zhuokun Zhong in Multimedia Tools and Applications
    Article 11 January 2024
Did you find what you were looking for? Share feedback.