Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review

A Ahmed, R Latif, S Latif, H Abbas, FA Khan - Multimedia Tools and …, 2018 - Springer
The emergence of Internet of Things (IoT) has introduced smart objects as the fundamental
building blocks for developing a smart cyber-physical universal environment. The IoTs have …

WITHDRAWN: An energy efficient load balancing on cloud computing using adaptive cat swarm optimization

K Balaji, PS Kiran, MS Kumar - 2021 - Elsevier
Withdrawal Notice WITHDRAWN: An energy efficient load balancing on cloud computing
using adaptive cat swarm optimizationK. Balaji a, â‡', P. Sai Kiran b, M. Sunil Kumar ca …

[PDF][PDF] Dynamic time slice calculation for round robin process scheduling using NOC

GSN Rao, N Srinivasu, SVN Srinivasu… - International Journal of …, 2015 - core.ac.uk
Process scheduling means allocating a certain amount of CPU time to each of the user
processes. One of the popular scheduling algorithms is the “Round Robin” algorithm, which …

The Enemy Within: A Framework for Understanding the Lifecycle of the Malicious Insider Threat to Information Systems

TA Robayo - 2022 - search.proquest.com
Malicious insider threats are a complex problem to information systems. The purpose of this
qualitative multi-case study was to investigate and present a framework to understand the …

Novel approach for control data theft attack in cloud computing

KN Sastry, BT Rao… - International Journal of …, 2015 - search.proquest.com
Abstract Information security is a major problem faced by cloud computing around the world.
Because of their adverse effects on organizational information systems, viruses, hackers …

[PDF][PDF] A secured cloud data storage with access privileges

N Vurukonda, BT Rao, BT Reddy - International Journal of Electrical and …, 2016 - core.ac.uk
In proposed framework client source information reinforcements off-site to outsider
distributed storage benefits to decrease information administration costs. In any case, client …

DC-MAABE: data centric multi-authority attribute based encryption on cloud storage

N Vurukonda, B Thirumala Rao - Journal of Computational and …, 2019 - ingentaconnect.com
In Recent technology advances in the cloud security enhancements creating an
environment to protect consumer sensitive data from the external entities. The ABE is a fine …

[PDF][PDF] The Factors Affecting on Managing Sensitive Data in Cloud Computing

HJ Muhasin, R Atan, MA Jabar… - Indonesian Journal of …, 2018 - academia.edu
Cloud computing represents the most important shift in computing and information
technology (IT). However, security and privacy remain the main obstacles to its widespread …

A Study on IP Network Recovery through Routing Protocols

K Karthik, T Gunasekhar, D Meenu… - Indonesian Journal of …, 2016 - section.iaesonline.com
Internet has taken major role in our communication infrastructure. Such that requirement of
internet availability and reliability has increasing accordingly. The major network failure …

[PDF][PDF] A Review on Cloud Security Challenges and Issues

K Balaji, PS Kiran - Indian Journal of Science …, 2016 - sciresol.s3.us-east-2.amazonaws …
Abstract Background/Objectives: Cloud computing offers various services with minimum
management effort while provisioning resources via internet. Cloud clients are allowed to …