A survey on cloud computing security: Issues, threats, and solutions
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand
services to consumers with greater flexibility in a cost effective manner. While moving …
services to consumers with greater flexibility in a cost effective manner. While moving …
Cloud computing security requirements: A systematic review
I Iankoulova, M Daneva - 2012 Sixth International Conference …, 2012 - ieeexplore.ieee.org
Many publications have dealt with various types of security requirements in cloud computing
but not all types have been explored in sufficient depth. It is also hard to understand which …
but not all types have been explored in sufficient depth. It is also hard to understand which …
A comprehensive literature of genetics cryptographic algorithms for data security in cloud computing
Cloud computing has revolutionized the world, opening up new horizons with bright
potential due to its performance, accessibility, low cost, and many other benefits. Cloud …
potential due to its performance, accessibility, low cost, and many other benefits. Cloud …
[HTML][HTML] The role of cloud computing technology: A savior to fight the lockdown in COVID 19 crisis, the benefits, characteristics and applications
The contagion of the Coronavirus (COVID-19) led to a global lockdown that put governments
in emergency mode. With the total number of positive cases worldwide exceeding the 97.46 …
in emergency mode. With the total number of positive cases worldwide exceeding the 97.46 …
Secure cloud storage based on cryptographic techniques
P Yong, Z Wei, XIE Feng, Z Dai, G Yang… - The Journal of China …, 2012 - Elsevier
Cloud computing is the delivery of computing and storage capacity as a service to users.
Cloud storage, as a subservice of infrastructure as a service (IaaS) in cloud computing, is a …
Cloud storage, as a subservice of infrastructure as a service (IaaS) in cloud computing, is a …
[PDF][PDF] Non-repudiation-based network security system using multiparty computation
KS Divya, HR Roopashree… - International Journal of …, 2022 - researchgate.net
Security has always been a prominent concern over the network, and various essential
requirements are required to cater to an efficient security system. Non-repudiation is a …
requirements are required to cater to an efficient security system. Non-repudiation is a …
[PDF][PDF] Data integrity attacks in cloud computing: A review of identifying and protecting techniques
DVS Kaja, Y Fatima, AB Mailewa - J. homepage www. ijrpr. com …, 2022 - researchgate.net
Cloud computing is growing tremendously in recent years. Many organizations are switching
their traditional computing model to a cloud based because of its low cost and pay-as-you …
their traditional computing model to a cloud based because of its low cost and pay-as-you …
Resilient and trustworthy dynamic data-driven application systems (DDDAS) services for crisis management environments
Future crisis management systems needresilient and trustworthy infrastructures to quickly
develop reliable applications and processes, andensure end-to-end security, trust, and …
develop reliable applications and processes, andensure end-to-end security, trust, and …
Multi-user dynamic proofs of data possession using trusted hardware
SR Tate, R Vishwanathan, L Everhart - … of the third ACM conference on …, 2013 - dl.acm.org
In storage outsourcing services, clients store their data on a potentially untrusted server,
which has more computational power and storage capacity than the individual clients. In this …
which has more computational power and storage capacity than the individual clients. In this …
Autonomic resilient cloud management (arcm) design and evaluation
C Tunc, F Fargo, Y Al-Nashif, S Hariri… - … Conference on Cloud …, 2014 - ieeexplore.ieee.org
Cloud Computing is emerging as a new paradigm that aims delivering computing as a utility.
For the cloud computing paradigm to be fully adopted and effectively used, it is critical that …
For the cloud computing paradigm to be fully adopted and effectively used, it is critical that …