A comprehensive study on cybersecurity challenges and opportunities in the IoT world

AN Lone, S Mustajab, M Alam - Security and Privacy, 2023 - Wiley Online Library
It has become possible to link anything and everything to the Internet in recent decades due
to the expanding Internet of Things (IoT). As a result, our usage of technology has changed a …

Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions

M Alam, M Shahid, S Mustajab - The Journal of Supercomputing, 2024 - Springer
In cloud computing environment, the workflow allocation mainly focuses on task assignment
to satisfy the quality-of-service (QoS) standards and workload balancing by the best use of …

Security driven dynamic level scheduling under precedence constrained tasks in IaaS cloud

M Alam, M Shahid, S Mustajab, F Ahmad - International Journal of …, 2024 - Springer
High performance in large-scale heterogeneous distributed infrastructure, like cloud
computing depends on effective scheduling algorithms. List-based scheduling is one of the …

Capacitated vehicle routing problem using algebraic Harris hawks optimization algorithm

M Sajid, MS Jawed, S Abidin, M Shahid… - … Techniques for Cyber …, 2023 - taylorfrancis.com
The capacitated vehicle routing problem (CVRP) is an NP-hard combinatorial optimization
problem that plays a significant role in end distribution in smart logistics. The CVRP solution …

A multi-hierarchy particle swarm optimization-based algorithm for cloud workflow scheduling

C Lu, J Zhu, H Huang, Y Sun - Future Generation Computer Systems, 2024 - Elsevier
In this paper, we consider the market-driven workflow scheduling problem on
heterogeneous cloud resources with deadline constraints. The transmission delay between …

Cloud computing: architecture, vision, challenges, opportunities, and emerging trends

M Alam, S Mustajab, M Shahid… - … , and Intelligent Systems …, 2023 - ieeexplore.ieee.org
Cloud computing stands at the forefront of a technological revolution, fundamentally altering
the provisioning, utilization, and administration of computing resources. This paper conducts …

A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage

VB Chenam, ST Ali - Journal of Information Security and Applications, 2024 - Elsevier
In the current age of constrained local storage capacity, ensuring the security and privacy of
user data against unauthorized third-party access has grown significantly more vital …

A hybrid optimization algorithm for energy-aware multi-objective task scheduling in heterogeneous multiprocessor systems

RM Sahoo, SK Padhy - Evolutionary Intelligence, 2024 - Springer
In order to successfully address the multiprocessor work scheduling issues, a novel hybrid
approach is presented in this paper. Executing a group of tasks on a small number of …

Efficient Resource Utilization in IoT and Cloud Computing

VK Prasad, D Dansana, MD Bhavsar, B Acharya… - Information, 2023 - mdpi.com
With the proliferation of IoT devices, there has been exponential growth in data generation,
placing substantial demands on both cloud computing (CC) and internet infrastructure. CC …

SDESA: secure cloud computing with gradient deep belief network and congruential advanced encryption

S Rani, PV Pravija Raj, AM Khedr - The Journal of Supercomputing, 2024 - Springer
With the aim to enhance cloud security with higher data confidentiality rate and integrity, we
propose a novel technique called Stochastic Deep Encryption Standard Algorithm (SDESA) …