[HTML][HTML] Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing

S Ali, SA Wadho, A Yichiet, ML Gan, CK Lee - Egyptian Informatics Journal, 2024 - Elsevier
Cloud computing security and data protection are becoming increasingly critical as its use
increases. The research we present demonstrates how undercover sharing techniques and …

Challenges of Using Live Process Migration in Distributed Exascale Systems

Z Sohrabi, EM Khaneghah - Azerbaijan Journal of High Performance …, 2020 - 82.194.3.83
Virtual machine-based process migrator mechanisms have the potential to be used in
distributed exascale systems due to their ability to execute process execution and support …

ExaLazy: A Model for Lazy-Copy Migration Mechanism to Support Distributed Exascale System

EM Khaneghah, T Khoshrooynemati… - Azerbaijan Journal of …, 2021 - 82.194.3.83
There is a possibility of dynamic and interactive nature occurring at any moment of the
scientific program implementation process in the computing system. While affecting the …

Implementación de una arquitectura escalable basada en Google Cloud Platform para mejorar la disponibilidad y escalabilidad de información de la empresa …

RM Llontop Garcia - 2020 - tesis.usat.edu.pe
En este artículo se presenta la propuesta de una arquitectura escalable para la mejora de la
disponibilidad y escalabilidad de la información basada en google cloud platform para la …

[PDF][PDF] Scaling Data Intensive Application Using Containerization Volunteering Cloud Computing

RA Sayany, A Aziz - Am J Compt Sci InformTechnol, 2021 - researchgate.net
The Application that is data intensive is costly to implement because it requires high
computational power and memory storage. Those applications which are not backed with …