A comprehensive study on cybersecurity challenges and opportunities in the IoT world
It has become possible to link anything and everything to the Internet in recent decades due
to the expanding Internet of Things (IoT). As a result, our usage of technology has changed a …
to the expanding Internet of Things (IoT). As a result, our usage of technology has changed a …
Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions
In cloud computing environment, the workflow allocation mainly focuses on task assignment
to satisfy the quality-of-service (QoS) standards and workload balancing by the best use of …
to satisfy the quality-of-service (QoS) standards and workload balancing by the best use of …
Security driven dynamic level scheduling under precedence constrained tasks in IaaS cloud
High performance in large-scale heterogeneous distributed infrastructure, like cloud
computing depends on effective scheduling algorithms. List-based scheduling is one of the …
computing depends on effective scheduling algorithms. List-based scheduling is one of the …
Capacitated vehicle routing problem using algebraic Harris hawks optimization algorithm
The capacitated vehicle routing problem (CVRP) is an NP-hard combinatorial optimization
problem that plays a significant role in end distribution in smart logistics. The CVRP solution …
problem that plays a significant role in end distribution in smart logistics. The CVRP solution …
A multi-hierarchy particle swarm optimization-based algorithm for cloud workflow scheduling
C Lu, J Zhu, H Huang, Y Sun - Future Generation Computer Systems, 2024 - Elsevier
In this paper, we consider the market-driven workflow scheduling problem on
heterogeneous cloud resources with deadline constraints. The transmission delay between …
heterogeneous cloud resources with deadline constraints. The transmission delay between …
Cloud computing: architecture, vision, challenges, opportunities, and emerging trends
Cloud computing stands at the forefront of a technological revolution, fundamentally altering
the provisioning, utilization, and administration of computing resources. This paper conducts …
the provisioning, utilization, and administration of computing resources. This paper conducts …
A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage
VB Chenam, ST Ali - Journal of Information Security and Applications, 2024 - Elsevier
In the current age of constrained local storage capacity, ensuring the security and privacy of
user data against unauthorized third-party access has grown significantly more vital …
user data against unauthorized third-party access has grown significantly more vital …
A hybrid optimization algorithm for energy-aware multi-objective task scheduling in heterogeneous multiprocessor systems
RM Sahoo, SK Padhy - Evolutionary Intelligence, 2024 - Springer
In order to successfully address the multiprocessor work scheduling issues, a novel hybrid
approach is presented in this paper. Executing a group of tasks on a small number of …
approach is presented in this paper. Executing a group of tasks on a small number of …
Efficient Resource Utilization in IoT and Cloud Computing
With the proliferation of IoT devices, there has been exponential growth in data generation,
placing substantial demands on both cloud computing (CC) and internet infrastructure. CC …
placing substantial demands on both cloud computing (CC) and internet infrastructure. CC …
SDESA: secure cloud computing with gradient deep belief network and congruential advanced encryption
S Rani, PV Pravija Raj, AM Khedr - The Journal of Supercomputing, 2024 - Springer
With the aim to enhance cloud security with higher data confidentiality rate and integrity, we
propose a novel technique called Stochastic Deep Encryption Standard Algorithm (SDESA) …
propose a novel technique called Stochastic Deep Encryption Standard Algorithm (SDESA) …