Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach
The Internet of Things (IoT) provides a new paradigm for the development of heterogeneous
and distributed systems, and it has increasingly become a ubiquitous computing service …
and distributed systems, and it has increasingly become a ubiquitous computing service …
MTD-DHJS: makespan-optimized task scheduling algorithm for cloud computing with dynamic computational time prediction
Cloud computing has revolutionized the management and analysis of data for organizations,
offering scalability, flexibility, and cost-effectiveness. Effective task scheduling in cloud …
offering scalability, flexibility, and cost-effectiveness. Effective task scheduling in cloud …
[PDF][PDF] Multi-factor authentication for secured financial transactions in cloud environment
D Prabakaran, S Ramachandran - CMC-Computers, Materials & …, 2022 - cdn.techscience.cn
The rise of the digital economy and the comfort of accessing by way of user mobile devices
expedite human endeavors in financial transactions over the Virtual Private Network (VPN) …
expedite human endeavors in financial transactions over the Virtual Private Network (VPN) …
A comprehensive study of cloud forensics
P Purnaye, V Kulkarni - Archives of Computational Methods in …, 2022 - Springer
Cloud Computing has many facets to it which makes it diverse. Investigation of a cyber-crime
that involves the cloud as a subject, object, or as an environment, is cloud forensics …
that involves the cloud as a subject, object, or as an environment, is cloud forensics …
Secure cloud-edge deployments, with trust
Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-
Edge infrastructures operated by different providers is a non-trivial task. In this article, we …
Edge infrastructures operated by different providers is a non-trivial task. In this article, we …
Using identity‐based cryptography as a foundation for an effective and secure cloud model for e‐health
Nowadays, one of the most popular applications is cloud computing for storing data and
information through World Wide Web. Since cloud computing has become available, users …
information through World Wide Web. Since cloud computing has become available, users …
A risk assessment model for selecting cloud service providers
E Cayirci, A Garaga, A Santana de Oliveira… - Journal of Cloud …, 2016 - Springer
Abstract The Cloud Adoption Risk Assessment Model is designed to help cloud customers in
assessing the risks that they face by selecting a specific cloud service provider. It evaluates …
assessing the risks that they face by selecting a specific cloud service provider. It evaluates …
Self-organized network management and computing of intelligent solutions to information security
X Zhu - Journal of Organizational and End User Computing …, 2021 - igi-global.com
The network in information age has become an important part of life, but in the process of in-
depth application of computers and networks, information security issues have also become …
depth application of computers and networks, information security issues have also become …
[HTML][HTML] Strategies for efficient resource management in federated cloud environments supporting Infrastructure as a Service (IaaS)
AK Samha - Journal of Engineering Research, 2024 - Elsevier
The increased market activity and visibility have resulted in a growing demand for additional
computer resources to meet the needs of cloud clients. Delivering promised quality of …
computer resources to meet the needs of cloud clients. Delivering promised quality of …
Context-aware multifaceted trust framework for evaluating trustworthiness of cloud providers
With the rapidly increasing number of cloud-based services, selecting a service provider is
becoming more and more difficult. Among the many factors to be considered, trust in a given …
becoming more and more difficult. Among the many factors to be considered, trust in a given …