Search
Search Results
-
Cloud data access governance and data security using distributed infrastructure with hybrid machine learning architectures
To address the concerns about security and privacy in cloud-based data storage, this study proposes a unique approach to secure cloud-based data...
-
Development of a Security Education Model System for Cloud Computing and Data Security and Privacy Protection
The great efficiency and dependability of cloud computing enhance the efficiency of mining and analyzing large data in education. Big data in...
-
Enhancing Data Security of Cloud Based LMS
Around the world, the educational system is evolving. The new trend can be found in traditional classroom systems as well as digitalization systems....
-
Cloud data transmission based on security and improved routing through hybrid machine learning techniques
A shared environment and the computer paradigm are combined in cloud computing (CC), enabling multiple users to access services and resources. This...
-
A novel model for enhancing cloud security and data deduplication using fuzzy and refraction learning based chimp optimization
Recently, the digitalization process generates an enormous amount of multimedia data that turn out to be further difficult to manage. The current...
-
Research on campus network security protection system framework based on cloud data and intrusion detection algorithm
The continuous progress of society has created conditions for the widespread use of information technology. People rely more and more on information...
-
Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security
Cloud computing refers to a set of hardware and software that are connected to provide various computing services. Cloud consists of services to...
-
Cloud and Big Data Security System’s Review Principles: A Decisive Investigation
We perceive big data with massive datasets of complex and variegated structures in the modern era. Such attributes formulate hindrances while...
-
Wireless 6G Cloud Communication Based Security Analysis Using Machine Learning in Internet of Medical Things (IoMT)
In order to safeguard confidentiality of patient data, healthcare data should not be made available to unauthorized individuals. By 2030, the...
-
Cloud Data Security Using Hybrid Encryption with Blockchain
Securing cloud computing is a significant challenge for the cloud services sector. If someone is using the cloud to store data, choosing an... -
A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm
Maximizing the security of the cloud system is most important need of this world. Similarly, the data controllers are also increased stealing the...
-
Security and privacy of digital economic risk assessment system based on cloud computing and blockchain
The digital economy constantly evolves and blockchain technology has become crucial in assessing risks. The security of the economic sector is of...
-
FAA-Cloud approach to minimize computation overhead using fuzzy-based crypto security
In recent days, for performing the data management as there is vast development in the real-time applications as cloud computing plays a vital role....
-
A Unified Approach Toward Security Audit and Compliance in Cloud Computing
The use of cloud computing has become a reliable information technology solution over the past decade by providing numerous services and resources on...
-
Cloud Security Threats and Solutions: A Survey
Cloud computing is the on-demand availability of PC framework resources. Especially information storage and handling power, without direct unique...
-
Healthcare Data Security in Cloud Environment
As of late, the cloud offers the advantage of putting away the potential documents to a far-off database that can be recovered on-demand. The... -
An Efficient Q-KPABE Framework to Enhance Cloud-Based IoT Security and Privacy
The Key Policy Attribute-based Encryption (KPABE) standard arises as the utmost appropriate security system for public key encipherment. KP-ABE has...
-
A Systematic Review on Game-Theoretic Models and Different Types of Security Requirements in Cloud Environment: Challenges and Opportunities
The presented survey paper explores the application of game theoretic models for addressing security challenges in cloud computing environments. It...
-
Data Security Threats Arising Between a Cloud and Its Users
A novel strategy that is increasingly becoming popular in today's world is cloud computing. With the advent of cloud computing, the internet has... -
An Effective Data Security Mechanism for Secured Data Communications Using Hybrid Cryptographic Technique and Quantum Key Distribution
One of the most flamboyant technological novelties of today's world is cloud computing, which has been fuelled by the increase in the number of smart...