[PDF][PDF] A review on data security in cloud computing

AA Soofi, MI Khan, FE Amin - International Journal of Computer …, 2017 - academia.edu
Cloud computing is an Internet-based computing and next stage in evolution of the internet.
It has received significant attention in recent years but security issue is one of the major …

[PDF][PDF] Cryptography based techniques of encryption for security of data in cloud computing paradigm

A Rajab, S Aqeel, MS Al Reshan, A Ashraf… - Int. J. Eng. Trends …, 2021 - researchgate.net
Cloud Computing (CC) is a cheap and userfriendly compatible platform that aims to provide
IT users over the internet to a business organization as well as another internet consumer by …

Double standards: Bringing task parallelism to HPF via the Message Passing Interface

I Foster, DR Kohr Jr, R Krishnaiyer… - Proceedings of the 1996 …, 1996 - dl.acm.org
High Performance Fortran (HPF) does not allow efficient expression of mixed task/data-
parallel computations or the coupling of separately compiled data-parallel modules. In this …

Access control reinforcement over searchable encryption

A Kaci, T Bouabana-Tebibel - Proceedings of the 2014 IEEE …, 2014 - ieeexplore.ieee.org
Ensuring data confidentiality in Cloud Computing is a very challenging task. Encryption is
one of the most secure techniques in use for this purpose. However, it remains vulnerable to …

A novel location-based encryption model using fuzzy vault scheme

L You, Y Chen, B Yan, M Zhan - Soft Computing, 2018 - Springer
The secure storage of the sensitive data in mobile devices is an urgent issue. Most of the
existed encryption algorithms are location independent, which means the encrypted data …

An Enhanced Framework for Data Protection in Cloud Environment using ECL-GWO Technique

R Kumar - 2023 International Conference on Innovative Data …, 2023 - ieeexplore.ieee.org
Computing that is done over the internet, or “cloud computing,” is a relatively recent
innovation. In cloud computing keeping data private, secure, anonymous, and reliable are …

Enhancement of VPN authentication using GPS information with geo-privacy protection

Y Jin, M Tomoishi, S Matsuura - 2016 25th International …, 2016 - ieeexplore.ieee.org
VPN (Virtual Private Network) technology is well used for remote access to the internal
server in order to mitigate intrusion attacks and data breaches. In the current VPN …

Secure framework for data access using Location based service in Mobile Cloud Computing

D Goyal, MB Krishna - 2015 Annual IEEE India Conference …, 2015 - ieeexplore.ieee.org
Mobile Cloud Computing (MCC) extends the services of cloud computing with respect to
mobility in cloud and user device. MCC offloads the computation and storage to the cloud …

Cloud Privacy and Security-A Review Paper

S Kumar, S Gupta, AV Singh - 2023 5th International …, 2023 - ieeexplore.ieee.org
Distributed computing hosts and conveys various administrations through internet there are
a great deal of reasons why individuals settle on utilizing cloud assets cloud improvement is …

Location-Based Cryptographic Techniques for Data Protection

NSM Shamsuddin, SA Pitchay - Malaysian Journal of Science …, 2019 - mjosht.usim.edu.my
Data protection has become one of the significant issues in cloud computing when end
users must rely on their cloud providers for security purposes. Cloud providers never …