On the opportunities of green computing: A survey
Artificial Intelligence (AI) has achieved significant advancements in technology and research
with the development over several decades, and is widely used in many areas including …
with the development over several decades, and is widely used in many areas including …
Auditing of outsourced data integrity-a taxonomy
AK Srivastava, M Kumar - Recent Advances in Electrical & …, 2023 - benthamdirect.com
Introduction: Cloud has gained a huge number of consumers in today's environment due to
its broad range of services. On the cloud server, data owners can store any type of data, and …
its broad range of services. On the cloud server, data owners can store any type of data, and …
Secure Token–Key Implications in an Enterprise Multi-Tenancy Environment Using BGV–EHC Hybrid Homomorphic Encryption
Authentication, authorization, and data access control are playing major roles in data
security and privacy. The proposed model integrated the multi-factor authentication …
security and privacy. The proposed model integrated the multi-factor authentication …
A survey on integrity auditing for data storage in the cloud: from single copy to multiple replicas
The rapid advancement of cloud computing has promoted the development of cloud storage
services. One of the biggest concerns of cloud users is whether the completeness and …
services. One of the biggest concerns of cloud users is whether the completeness and …
An Analysis of Different Security Models and the Obstacles of Ensuring Security and Privacy while Storing Data on the Cloud
S Naseem, S Sidrat, MM Hussain - Computer Networks and …, 2024 - ojs.wiserpub.com
Every day, cloud computing—which stores user data online—becomes more and more
popular. Instead of being aware of security risks, the main goal of a cloud-based system is to …
popular. Instead of being aware of security risks, the main goal of a cloud-based system is to …
Comparative analysis of cloud security complexities and past proposed non-homomorphic and homomorphic encryption methodologies with limitations
The cloud computing is playing a major role in the evaluation of technical life of mankind
with the successful execution of various cloud services such as software, application …
with the successful execution of various cloud services such as software, application …
Компьютерлік желілерді қорғауға және мониторингілеуге арналған бұлттық сервис
АB Оspanova, АТ Zharkimbekova… - Engineering …, 2021 - vestnik.satbayev.university
Аңдатпа. Осы зерттеу жұмысында бұлттық қызметтер, ақпараттық қауіпсіздік және
жасанды интеллект саласындағы зерттеулер қарастырылды. Ақпараттық …
жасанды интеллект саласындағы зерттеулер қарастырылды. Ақпараттық …