A Critical Investigation and Analysis of Strategic Techniques Before Approving Cloud Computing Service Frameworks

VV Vegesna - International Journal of Management, Technology …, 2023 - papers.ssrn.com
Cloud computing is becoming increasingly fashionable in distributed computing
environment. Processing and Data storage use cloud environment is becoming a movement …

Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities

A Kumar, SB Khan, SK Pandey, A Shankar… - Journal of Cloud …, 2023 - Springer
Cloud computing is the most recent smart city advancement, made possible by the
increasing volume of heterogeneous data produced by apps. More storage capacity and …

[PDF][PDF] Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.

SS Pericherla - ISC Int. J. Inf. Secur., 2023 - researchgate.net
Cloud computing created a revolution in the way IT organizations and IT teams manage their
internal digital resources and workloads. One major drawback or limitation of cloud …

CR-PPA: Connection Resilient Privacy Preserving Authentication for V2V Communications using VANET

L Ramya, K Umadevi - 2024 Second International Conference …, 2024 - ieeexplore.ieee.org
Background: Typically, Vehicular Ad Hoc Networks (VANETs) rely on the use of public keys
for communication authenticity verification and authorization. Reliability is a key problem for …

The Role of Big Tech in Providing Cybersecurity to End Users: A Qualitative Case Study

JM Morgan - 2023 - search.proquest.com
This study focused on exploring the lived experiences of big technology (big tech) end-user
assumptions of security. The problem was end-users of big technology assumed a level of …