An efficient and secure model using adaptive optimal deep learning for task scheduling in cloud computing

S Badri, DM Alghazzawi, SH Hasan, F Alfayez… - Electronics, 2023 - mdpi.com
Recently, cloud computing resources have become one of the trending technologies that
permit the user to manage diverse resources and a huge amount of data in the cloud. Task …

TEE: A virtual DRTM based execution environment for secure cloud-end computing

W Dai, H Jin, D Zou, S Xu, W Zheng, L Shi - Proceedings of the 17th …, 2010 - dl.acm.org
Cloud computing is believed to be the next major paradigm of computing because it will
substantially reduce the cost of IT systems. Ensuring security in the cloud-end is necessary …

Machine learning-based intelligent security framework for secure cloud key management

S Ahmad, S Mehfuz, S Urooj, N Alsubaie - Cluster Computing, 2024 - Springer
Ensuring the confidentiality, integrity, and availability of sensitive data in cloud environments
relies heavily on the robust management of cryptographic keys. With the expansion of cloud …

Fast and parallel trust computing scheme based on big data analysis for collaboration cloud service

X Li, J Yuan, H Ma, W Yao - IEEE transactions on information …, 2018 - ieeexplore.ieee.org
Providing high trustworthy service is the most fundamental task for any cloud computing
platform. Users are willing to deliver their computing tasks and the most sensitive data to …

A novel method to enhance sustainable systems security in cloud computing based on the combination of encryption and data mining

Q He, H He - Sustainability, 2020 - mdpi.com
Due to the increasing growth of technologies and the diversity of user needs in the field of
information technology, the position of cloud computing is becoming more apparent. The …

VPSL: Verifiable privacy-preserving data search for cloud-assisted Internet of Things

Q Tong, Y Miao, X Liu, KKR Choo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cloud-assisted Internet of Things (IoT) is increasingly prevalent used in various fields, such
as the healthcare system. While in such a scenario, sensitive data (eg, personal electronic …

Self-service cloud computing

S Butt, HA Lagar-Cavilla, A Srivastava… - Proceedings of the 2012 …, 2012 - dl.acm.org
Modern cloud computing infrastructures use virtual machine monitors (VMMs) that often
include a large and complex administrative domain with privileges to inspect client VM state …

[HTML][HTML] An extended intelligent water drop approach for efficient VM allocation in secure cloud computing framework

K Dubey, SC Sharma - Journal of King Saud University-Computer and …, 2022 - Elsevier
Cloud computing provides many advantages services to its users like online resources
accessibility, better cost management, dynamic resource pooling, and efficient Virtual …

[HTML][HTML] A review on job scheduling technique in cloud computing and priority rule based intelligent framework

SA Murad, AJM Muzahid, ZRM Azmi, MI Hoque… - Journal of King Saud …, 2022 - Elsevier
In recent years, the concept of cloud computing has been gaining traction to provide
dynamically increasing access to shared computing resources (software and hardware) via …

Secure task offloading in blockchain-enabled mobile edge computing with deep reinforcement learning

A Samy, IA Elgendy, H Yu, W Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Mobile Edge Computing (MEC) is a promising and fast-developing paradigm that provides
cloud services at the edge of the network. MEC enables IoT devices to offload and execute …