Search
Search Results
-
A secure and lightweight cloud-centric intelligent medical system based on Internet of Medical Things
Internet of Medical Things (IoMT) technology is widely used in intelligent medical treatment; however, massive mobile data transmission makes the...
-
An optimal task scheduling method in IoT-Fog-Cloud network using multi-objective moth-flame algorithm
Nowadays, cloud and fog computing have been leveraged to enhance Internet of Things (IoT) performance. The outstanding potential of cloud platforms...
-
A method to recommend cloud manufacturing service based on the spectral clustering and improved Slope one algorithm
The booming growth of cloud manufacturing services provides users with more choices. However, cloud manufacturing service recommendation remains a...
-
Enhanced authentication for de-duplication of big data on cloud storage system using machine learning approach
Enormous information is an accumulation of vast measures of information that contains copied things gathered from different sources. Distinguishing...
-
Pmir: an efficient privacy-preserving medical images search in cloud-assisted scenario
With the advancement of content-based medical image retrieval (CBMIR) technology which is used as a convenient assistant for medical diagnosis....
-
AI-enabled legacy data integration with privacy protection: a case study on regional cloud arbitration court
This paper presents an interesting case study on Legacy Data Integration (LDI for short) for a Regional Cloud Arbitration Court. Due to the...
-
An Intelligent Lightweight Signing Signature and Secured Jellyfish Data Aggregation (LS3JDA) Based Privacy Preserving Model in Cloud
Develo** a secured and accurate disease diagnosis framework in the healthcare cloud systems are still remains one of the crucial problems in recent...
-
A novel Jarratt butterfly Ebola optimization-based attentional random forest for data anonymization in cloud environment
Privacy and security are the most essential barriers preventing widespread public cloud adaptation. The data that is distributed within the cloud...
-
Task scheduling for improved response time of latency sensitive applications in fog integrated cloud environment
Fog integrated Cloud Computing is a distributed computing paradigm where near-user end devices known as fog nodes cooperate with cloud resources...
-
A two-tier multi-objective service placement in container-based fog-cloud computing platforms
The utilization of cloud computing in Internet of Things (IoT) applications has become widespread. However, it presents challenges for...
-
Blockchain Assisted Cloud Security and Privacy Preservation using Hybridized Encryption and Deep Learning Mechanism in IoT-Healthcare Application
The fundamental issue that happens in cloud computing is considered to be privacy when applying it in Ubiquitous healthcare systems, which rely on...
-
Cloud Integration and Orchestration
The objective of this chapter is to introduce the basics of cloud integration and orchestration in multi-cloud environments. Through this chapter,... -
An archetypal determination of mobile cloud computing for emergency applications using decision tree algorithm
Numerous users are experiencing unsafe communications due to the growth of big network mediums, where no node communication is detected in emergency...
-
E-Health Threat Intelligence Within Cyber-Defence Framework for E-Health Organizations
In recent years, scholarly work on cybersecurity in smart health has gained substantial attention from both practitioners and scholars. This is... -
Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities
Electronic health records (EHRs) are increasingly employed to maintain, store and share varied types of patient data. The data can also be utilized...
-
Prioritized scheduling technique for healthcare tasks in cloud computing
The Internet-of-things (IoT) plays a significant role in healthcare monitoring, where the IoT Cloud integration introduces many new opportunities for...
-
A Modest Approach Toward Cloud Security Hygiene
Cloud computing offers an on-demand process and computing service without direct active management by the user. It can reach thousands of different... -
A cloud weather forecasting service and its relationship with anomaly detection
The main goal of the anomaly detection analysis is to identify the observations that do not adhere to general patterns considered normal behavior. In...
-
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud
The encryption of user data is crucial when employing electronic health record services to guarantee the security of the data stored on cloud...
-
Cloud-edge load balancing distributed protocol for IoE services using swarm intelligence
Rapid development of the Internet of Everything (IoE) and cloud services offer a vital role in the growth of smart applications. It provides...