Adaptive ontology-based IoT resource provisioning in computing systems

A Tiwari, R Garg - International Journal on Semantic Web and …, 2022 - igi-global.com
The eagle expresses of cloud computing plays a pivotal role in the development of
technology. The aim is to solve in such a way that it will provide an optimized solution. The …

A novel blockchain based framework to secure IoT-LLNs against routing attacks

R Sahay, G Geethakumari, B Mitra - Computing, 2020 - Springer
Routing attacks in the Internet of Things environment (IoT) can result in degraded network
performance and often denial of service. Low Power and Lossy Network (LLN) is that …

Virtualization vulnerabilities, security issues, and solutions: a critical study and comparison

D Tank, A Aggarwal, N Chaubey - International Journal of Information …, 2019 - Springer
Virtualization is technological revolution that separates functions from underlying hardware
and allows us to create useful environment from abstract resources. Virtualization …

Emerging ontology formulation of optimized internet of things (IOT) services with cloud computing

A Tiwari, RM Sharma, R Garg - Soft Computing: Theories and Applications …, 2020 - Springer
The eagle expresses of cloud computing plays a pivotal role in the development of
technology. The technology momentum is gaining cloud system environment across the …

Designing a trivial information relaying scheme for assuring safety in mobile cloud computing environment

N Thillaiarasu, SC Pandian, V Vijayakumar… - Wireless …, 2021 - Springer
Due to increased attraction in cloud computing, mobile devices could store or acquire
private and confidential information from everywhere at any point in time. In parallel, the …

[PDF][PDF] Eagle Techniques In Cloud Computational Formulation

A Tiwari - Journal of Data Processing Volume, 2020 - dline.info
The Eagle expresses of Cloud computing plays a pivotal role in the development of
Technology. The Technology momentum gaining Cloud System environment across the …

SDVADC: secure deduplication and virtual auditing of data in cloud

CM Geeta, SR RG, S Raghavendra, R Buyya… - Procedia Computer …, 2020 - Elsevier
Over the last few years, deploying data to cloud service for repository is an appealing
passion that avoids efforts on significant information sustenance and administration. In …

CRUPA: collusion resistant user revocable public auditing of shared data in cloud

GC Mara, U Rathod, SR RG, R Buyya… - Journal of Cloud …, 2020 - Springer
Cloud repository is one of the most important services afforded by Cloud Computing where
information is preserved, maintained, archived in distant servers and made available to the …

Security and storage improvement in distributed cloud data centers by increasing reliability based on particle swarm optimization and artificial immune system …

A Chamkoori, S Katebi - Concurrency and Computation …, 2023 - Wiley Online Library
One of the major concerns in security and storage improvement of data centers is due to the
fact that there is a possibility of access to cloud information, and the distance between data …

Bio-inspired approach and integrity check mechanism for secure data storage in multi-cloud environment

MH Mohammed - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
Storage of data in consumption of distantly positioned outsized information centres for the
processing of data of users that perhaps the clients not currently have any leverage over …