We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Cloud data access governance and data security using distributed infrastructure with hybrid machine learning architectures

    To address the concerns about security and privacy in cloud-based data storage, this study proposes a unique approach to secure cloud-based data...

    C. Tamizshelvan, V. Vijayalakshmi in Wireless Networks
    Article 26 January 2024
  2. Development of a Security Education Model System for Cloud Computing and Data Security and Privacy Protection

    The great efficiency and dependability of cloud computing enhance the efficiency of mining and analyzing large data in education. Big data in...

    Rui Jia, **aoli Ni, ... Qunkun Qi in Wireless Personal Communications
    Article 03 July 2023
  3. Enhancing Data Security of Cloud Based LMS

    Around the world, the educational system is evolving. The new trend can be found in traditional classroom systems as well as digitalization systems....

    Paramita Chatterjee, Rajesh Bose, ... Sandip Roy in Wireless Personal Communications
    Article 18 March 2023
  4. Cloud data transmission based on security and improved routing through hybrid machine learning techniques

    A shared environment and the computer paradigm are combined in cloud computing (CC), enabling multiple users to access services and resources. This...

    Shamimul Qamar, Mohd Amaan, ... Shadab Alam in Soft Computing
    Article 16 May 2023
  5. A novel model for enhancing cloud security and data deduplication using fuzzy and refraction learning based chimp optimization

    Recently, the digitalization process generates an enormous amount of multimedia data that turn out to be further difficult to manage. The current...

    Mohanaprakash Thottipalayam Andavan, M. Parameswari, ... Nirmalrani Vairaperumal in International Journal of Machine Learning and Cybernetics
    Article 07 September 2023
  6. Research on campus network security protection system framework based on cloud data and intrusion detection algorithm

    The continuous progress of society has created conditions for the widespread use of information technology. People rely more and more on information...

    Wang Shaorong, Long Guiling in Soft Computing
    Article 07 April 2023
  7. Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security

    Cloud computing refers to a set of hardware and software that are connected to provide various computing services. Cloud consists of services to...

    V. Balamurugan, R. Karthikeyan, ... Robin Cyriac in Wireless Networks
    Article 03 October 2022
  8. Cloud and Big Data Security System’s Review Principles: A Decisive Investigation

    We perceive big data with massive datasets of complex and variegated structures in the modern era. Such attributes formulate hindrances while...

    KamtaNath Mishra, Vandana Bhattacharjee, ... Shivam P. Mishra in Wireless Personal Communications
    Article 10 June 2022
  9. Wireless 6G Cloud Communication Based Security Analysis Using Machine Learning in Internet of Medical Things (IoMT)

    In order to safeguard confidentiality of patient data, healthcare data should not be made available to unauthorized individuals. By 2030, the...

    Jicheng Chen, Yihan Xu, ... Rui Han in Wireless Personal Communications
    Article 15 May 2024
  10. Cloud Data Security Using Hybrid Encryption with Blockchain

    Securing cloud computing is a significant challenge for the cloud services sector. If someone is using the cloud to store data, choosing an...
    Kalaiselvi Soundappan, Govind Sreekar Shenoy in Advances in Communication and Applications
    Conference paper 2024
  11. A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm

    Maximizing the security of the cloud system is most important need of this world. Similarly, the data controllers are also increased stealing the...

    Sahaya Stalin Jose G, Sugitha G, ... Preethi B. C in Peer-to-Peer Networking and Applications
    Article 06 February 2024
  12. Security and privacy of digital economic risk assessment system based on cloud computing and blockchain

    The digital economy constantly evolves and blockchain technology has become crucial in assessing risks. The security of the economic sector is of...

    Wen** ** in Soft Computing
    Article 10 January 2024
  13. FAA-Cloud approach to minimize computation overhead using fuzzy-based crypto security

    In recent days, for performing the data management as there is vast development in the real-time applications as cloud computing plays a vital role....

    Praneeth Kanagala, Ramkumar Jayaraman in Soft Computing
    Article 06 May 2023
  14. A Unified Approach Toward Security Audit and Compliance in Cloud Computing

    The use of cloud computing has become a reliable information technology solution over the past decade by providing numerous services and resources on...

    Y. S. Rajesh, V. G. Kiran Kumar, Asmita Poojari in Journal of The Institution of Engineers (India): Series B
    Article 23 March 2024
  15. Cloud Security Threats and Solutions: A Survey

    Cloud computing is the on-demand availability of PC framework resources. Especially information storage and handling power, without direct unique...

    Umer Ahmed Butt, Rashid Amin, ... Nasser Albaqami in Wireless Personal Communications
    Article 19 September 2022
  16. Healthcare Data Security in Cloud Environment

    As of late, the cloud offers the advantage of putting away the potential documents to a far-off database that can be recovered on-demand. The...
    Conference paper 2023
  17. An Efficient Q-KPABE Framework to Enhance Cloud-Based IoT Security and Privacy

    The Key Policy Attribute-based Encryption (KPABE) standard arises as the utmost appropriate security system for public key encipherment. KP-ABE has...

    Kranthi Kumar Singamaneni, Anil Kumar Budati, Thulasi Bikku in Wireless Personal Communications
    Article 13 March 2024
  18. A Systematic Review on Game-Theoretic Models and Different Types of Security Requirements in Cloud Environment: Challenges and Opportunities

    The presented survey paper explores the application of game theoretic models for addressing security challenges in cloud computing environments. It...

    Komal Singh Gill, Anju Sharma, Sharad Saxena in Archives of Computational Methods in Engineering
    Article 01 April 2024
  19. Data Security Threats Arising Between a Cloud and Its Users

    A novel strategy that is increasingly becoming popular in today's world is cloud computing. With the advent of cloud computing, the internet has...
    Anuj Kumar Gupta, Monika Pathak in Mobile Radio Communications and 5G Networks
    Conference paper 2024
  20. An Effective Data Security Mechanism for Secured Data Communications Using Hybrid Cryptographic Technique and Quantum Key Distribution

    One of the most flamboyant technological novelties of today's world is cloud computing, which has been fuelled by the increase in the number of smart...

    Jananya Sivakumar, Sannasi Ganapathy in Wireless Personal Communications
    Article 01 December 2023
Did you find what you were looking for? Share feedback.