Search

Search Results

Showing 1-20 of 23,592 results
  1. Article

    Cloud computing security assurance modelling through risk analysis using machine learning

    The concept of Cloud Computing has exploded in popularity, and the reason for this is the cost-effective transmission, storage, and powerful...

    30 January 2025
  2. Article

    A Unified Approach Toward Security Audit and Compliance in Cloud Computing

    The use of cloud computing has become a reliable information technology solution over the past decade by providing numerous services and resources on...

    Y. S. Rajesh, V. G. Kiran Kumar, Asmita Poojari in Journal of The Institution of Engineers (India): Series B
    23 March 2024
  3. Chapter

    Information Security and Cloud Computing

    Cloud Computing exacerbates computer securityCloud Computing issues arising from multi-tenancy and open access due to multiple users sharing...
    Pramod Gupta, Naresh Kumar Sehgal, John M. Acken in Introduction to Machine Learning with Security
    2025
  4. Article

    Security and privacy of digital economic risk assessment system based on cloud computing and blockchain

    The digital economy constantly evolves and blockchain technology has become crucial in assessing risks. The security of the economic sector is of...

    Wenjin Jin in Soft Computing
    10 January 2024
  5. Article

    Development of a Security Education Model System for Cloud Computing and Data Security and Privacy Protection

    The great efficiency and dependability of cloud computing enhance the efficiency of mining and analyzing large data in education. Big data in...

    Rui Jia, Xiaoli Ni, ... Qunkun Qi in Wireless Personal Communications
    03 July 2023
  6. Article

    Soft computing in computer network security protection system with machine learning based on level protection in the cloud environment

    Artificial neural networks (ANN), fuzzy inference systems, approximate reasoning, and derivative-free optimization approaches like evolutionary...

    Merin Thomas, Mohan Vishal Gupta, ... Shailee Lohmor Choudhary in Soft Computing
    13 May 2023
  7. Article

    Enhancing data security in the cloud using MECC-SIDH enhanced CL-HPAEKS scheme

    Modern cloud computing environments require strong cryptographic solutions to ensure data confidentiality and security against quantum computing...

    C. P. Thamil Selvi, R. Lakshmana Kumar, P. Punitha in Wireless Networks
    17 January 2025
  8. Article

    Advanced model for maximizing multi-cloud security through job scheduling

    In multi-cloud systems, task scheduling optimizes the allocation of work among many cloud providers, effectively implementing capacity and performing...

    Simarjeet Makkar, Jaspreet Sidhu, ... Jyoti Shekhawat in International Journal of System Assurance Engineering and Management
    21 November 2024
  9. Article
    Full access

    Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture

    With the continuous progress of the Internet of Things (IoT) technology, IoT devices have gradually penetrated all aspects of life. However, due to...

    Tsu-Yang Wu, Fangfang Kong, ... Chien-Ming Chen in EURASIP Journal on Wireless Communications and Networking
    27 April 2023 Open access
  10. Article

    Innovative model for security of multi-cloud platform: data integrity perspective

    Cloud computing is attractive extra popular in science and industry because of its effectiveness, quick access and reconfigurable resources. It does...

    S. Adlin Jebakumari, Shriya Mahajan, ... Zahid Ahmed in International Journal of System Assurance Engineering and Management
    19 November 2024
  11. Article

    Military Computing Security: Insights and Implications

    In an era of heightened technological dependence in military operations, safeguarding the security of military computing systems is of paramount...

    Kavita Sahu, Rajeev Kumar, ... A. K. Singh in Journal of The Institution of Engineers (India): Series B
    21 August 2024
  12. Article

    A Systematic Review on Game-Theoretic Models and Different Types of Security Requirements in Cloud Environment: Challenges and Opportunities

    The presented survey paper explores the application of game theoretic models for addressing security challenges in cloud computing environments. It...

    Komal Singh Gill, Anju Sharma, Sharad Saxena in Archives of Computational Methods in Engineering
    01 April 2024
  13. Article
    Full access

    Incentive approaches for cloud computing: challenges and solutions

    Cloud computing enables highly configurable and reliable computing resources on a rentable per-use scheme, facilitating quick and cost-effective...

    26 February 2024 Open access
  14. Conference paper

    Security Architecture of Cloud Computing and Its Case Study

    Cloud computing provides services that use more internet resources as needed. This helps users because it's easy to use and affordable. But, when...
    Anurag Vaishnav, Ram Ji Gupta, ... Akhil Pandey in Emerging Trends in Expert Applications and Security
    2024
  15. Article

    Wireless 6G Cloud Communication Based Security Analysis Using Machine Learning in Internet of Medical Things (IoMT)

    In order to safeguard confidentiality of patient data, healthcare data should not be made available to unauthorized individuals. By 2030, the...

    Jicheng Chen, Yihan Xu, ... Rui Han in Wireless Personal Communications
    15 May 2024
  16. Article

    An efficient strategy for ensuring multi-cloud information security

    Multi-cloud applications including data security are becoming more accepted. This study offers a multi-cloud substructure that guarantees user data...

    Shubhansh Bansal, M. S. Nidhya, ... Prateek Garg in International Journal of System Assurance Engineering and Management
    08 January 2025
  17. Article

    An Enhanced D Level Cut-Off Point-Quantum Secret Sharing Access Structure Scheme Based Efficient Monitoring Key Ciphertext Attributes with Encryption Access Control with Blockchain and Key Mechanism for Security in Cloud Computing

    Due to the exponential growth of cloud data and network services, computational resources and cloud data security have one of the most attractive...

    Atul Kumar Srivastava, Dhiraj Pandey, Alok Agarwal in Wireless Personal Communications
    01 March 2024
  18. Chapter

    Cloud Computing and Information Security

    Computer security issues exacerbate with growth of the Internet as more people and computers join the web, opening new ways to compromise an...
    Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken in Cloud Computing with Security and Scalability.
    2023
  19. Conference paper

    A Review on Security Vulnerabilities in Cloud Computing

    Cloud computing is a shared pool of programmable computer system resources and higher-level services that can be instantly delivered through the...
    Juvi Bharti, Sarpreet Singh in Data Engineering and Applications
    2024
  20. Article

    Optimizing security and Qos in multi-cloud platform using a novel approach

    The study develops and implements an intelligent system designed to enhance security and maintain high Quality of Service (QoS) in multi-cloud...

    M. S. Nidhya, Nishu Niharika, ... Manish Kumar Goyal in International Journal of System Assurance Engineering and Management
    19 February 2025
Did you find what you were looking for? Share feedback.