[PDF][PDF] Performance Comparison of Xen AND Hyper-V in Cloud Computing While Using Cryptosystems.

WK Abdulraheem - International Journal of Advances in Soft Computing & …, 2022 - i-csrs.org
Cloud computing is internet-distributed computing model transferring processes from
personal computers or servers to cloud servers. Nowadays, security and performance of …

Fully homomorphic encryption for cloud based e-government data

R Deviani, SA Nazhifah, AS Aziz - … Jurnal Pendidikan Teknologi …, 2022 - jurnal.ar-raniry.ac.id
Cloud computing is a way of providing services, networks, hardware, storage, and interfaces
for the construction of E-Government infrastructure that enables the delivery of services …

Analysis Of Cloud Computing Security Threats and Countermeasures

S Kumari, K Solanki, S Dalal… - 2022 10th International …, 2022 - ieeexplore.ieee.org
The demand for Cloud Computing (CC) is increasing at a higher growth rate because of the
emerging technologies like machine learning, artificial intelligence, big data analytics, IoT …

Security and privacy-efficient encryption algorithm for cloud data using genetic prime crossover technique

M Suganya, T Sasipraba - 2022 1st International Conference …, 2022 - ieeexplore.ieee.org
Cloud Storage has become one of the essential services over the last decade.
Simultaneously, the risk of storing data in a cloud environment is also increasing. Cloud …

[PDF][PDF] Fully Homomorphic Encryption (FHE) pada Penyimpanan Data E-Government Berbasis Cloud

R Deviani, SA Nazhifah, AS Aziz - Jurnal Pendidikan Teknologi …, 2022 - scholar.archive.org
Komputasi awan adalah gabungan komponen sistem teknologi informasi seperti servis,
jaringan, perangkat keras, penyimpanan, dan interface untuk membuat infrastruktur E …

Hybrid Cryptography Algorithm for the Internet of Things based Plant Information Security

JS Prasath, SK Afrid, RB Sri - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is the current trends in monitoring and control of plant parameters in
industrial operations. Internet is widely used in various fields and it is utilized to collect large …

Web Application Security on Top of Public Cloud

M Kumar, V Jeni - 2022 Second International Conference on …, 2022 - ieeexplore.ieee.org
The prevalence of Microservices has made it quintessential to build web applications in a
Cloud-Native fashion. While building applications in a cloud-native way, almost the entire …

Big Data Infrastructure For Cloud Computing

HMQ Amin - 2022 - diva-portal.org
It is becoming increasingly common for" cloud" organizations to provide information
technology services and for businesses and individuals alike to use information technology …

[引用][C] A SYSTEMATIC REVIEW OF HOMOMORPHIC ENCRYPTION TECHNOLOGIES IN SUSTAINABLE DEVELOPMENT

A Bena