Big data handling approach for unauthorized cloud computing access

A Razaque, N Shaldanbayeva, B Alotaibi, M Alotaibi… - Electronics, 2022 - mdpi.com
Nowadays, cloud computing is one of the important and rapidly growing services; its
capabilities and applications have been extended to various areas of life. Cloud computing …

T-safe: Trustworthy service provisioning for IoT-based intelligent transport systems

P Dass, S Misra, C Roy - IEEE Transactions on Vehicular …, 2020 - ieeexplore.ieee.org
In this paper, we propose a trustworthy service provisioning scheme for Safety-as-a-Service
(Safe-aaS) infrastructure in IoT-based intelligent transport systems. Typically, a Safe-aaS …

[PDF][PDF] Big Data Handling Approach for Unauthorized Cloud Computing Access. Electronics 2022, 11, 137

A Razaque, N Shaldanbayeva, B Alotaibi, M Alotaibi… - 2022 - academia.edu
Nowadays, cloud computing is one of the important and rapidly growing services; its
capabilities and applications have been extended to various areas of life. Cloud computing …

Big Data Handling Approach for Unauthorized Access of Cloud Computing

A Razaque, S Nazerke, B Alotaibi, M Alotaibi, A Murat… - 2021 - preprints.org
Nowadays, cloud computing is one of the important and rapidly growing paradigms that
extend its capabilities and applications in various areas of life. The cloud computing system …