Adaptive ontology-based IoT resource provisioning in computing systems
The eagle expresses of cloud computing plays a pivotal role in the development of
technology. The aim is to solve in such a way that it will provide an optimized solution. The …
technology. The aim is to solve in such a way that it will provide an optimized solution. The …
A novel blockchain based framework to secure IoT-LLNs against routing attacks
Routing attacks in the Internet of Things environment (IoT) can result in degraded network
performance and often denial of service. Low Power and Lossy Network (LLN) is that …
performance and often denial of service. Low Power and Lossy Network (LLN) is that …
Virtualization vulnerabilities, security issues, and solutions: a critical study and comparison
D Tank, A Aggarwal, N Chaubey - International Journal of Information …, 2019 - Springer
Virtualization is technological revolution that separates functions from underlying hardware
and allows us to create useful environment from abstract resources. Virtualization …
and allows us to create useful environment from abstract resources. Virtualization …
Emerging ontology formulation of optimized internet of things (IOT) services with cloud computing
The eagle expresses of cloud computing plays a pivotal role in the development of
technology. The technology momentum is gaining cloud system environment across the …
technology. The technology momentum is gaining cloud system environment across the …
Designing a trivial information relaying scheme for assuring safety in mobile cloud computing environment
Due to increased attraction in cloud computing, mobile devices could store or acquire
private and confidential information from everywhere at any point in time. In parallel, the …
private and confidential information from everywhere at any point in time. In parallel, the …
[PDF][PDF] Eagle Techniques In Cloud Computational Formulation
A Tiwari - Journal of Data Processing Volume, 2020 - dline.info
The Eagle expresses of Cloud computing plays a pivotal role in the development of
Technology. The Technology momentum gaining Cloud System environment across the …
Technology. The Technology momentum gaining Cloud System environment across the …
SDVADC: secure deduplication and virtual auditing of data in cloud
Over the last few years, deploying data to cloud service for repository is an appealing
passion that avoids efforts on significant information sustenance and administration. In …
passion that avoids efforts on significant information sustenance and administration. In …
CRUPA: collusion resistant user revocable public auditing of shared data in cloud
Cloud repository is one of the most important services afforded by Cloud Computing where
information is preserved, maintained, archived in distant servers and made available to the …
information is preserved, maintained, archived in distant servers and made available to the …
Security and storage improvement in distributed cloud data centers by increasing reliability based on particle swarm optimization and artificial immune system …
A Chamkoori, S Katebi - Concurrency and Computation …, 2023 - Wiley Online Library
One of the major concerns in security and storage improvement of data centers is due to the
fact that there is a possibility of access to cloud information, and the distance between data …
fact that there is a possibility of access to cloud information, and the distance between data …
Bio-inspired approach and integrity check mechanism for secure data storage in multi-cloud environment
MH Mohammed - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
Storage of data in consumption of distantly positioned outsized information centres for the
processing of data of users that perhaps the clients not currently have any leverage over …
processing of data of users that perhaps the clients not currently have any leverage over …