A review of machine learning algorithms for cloud computing security

UA Butt, M Mehmood, SBH Shah, R Amin, MW Shaukat… - Electronics, 2020 - mdpi.com
… In this review paper, we present an analysis of CC security threats, issues, and solutions …
ML algorithms. We review different ML algorithms that are used to overcome the cloud security

[PDF][PDF] Security algorithm in cloud computing: overview

M Vijayapriya - International Journal of Computer Science & …, 2013 - Citeseer
… presents what cloud computing is, security algorithms and the challenges in cloud computing.
… This paper describes the overview of cloud computing, algorithms used and its security

Comparative analysis of security algorithms used in cloud computing

M Tajammul, R Parveen… - … Conference on Computing …, 2021 - ieeexplore.ieee.org
… , firstly security attacks have been discussed then security goals and … security algorithms,
we have taken three algorithms into consideration that are AES, DES and Two-Pass algorithms

[PDF][PDF] Cloud security algorithms

EA Pansotra, ESP Singh - International journal of security and its …, 2015 - researchgate.net
… One of the big advantage of cloud computing is virtualization, but we can use cloud
computing properly only if it provide reliable security. Cloud computing is mostly used because it …

[PDF][PDF] Security algorithms in cloud computing

T Ramaporkalai - International Journal of Computer Science Trends …, 2017 - academia.edu
cloud computing is virtualization, but we can use cloud computing properly only if it provides
reliable security. … There are many security algorithms, but security of all these algorithms can …

Security algorithms for cloud computing

A Bhardwaj, GVB Subrahmanyam, V Avasthi… - Procedia Computer …, 2016 - Elsevier
Cloud Computing and Information Security, there is growing awareness and usage of Security
Algorithms … of Cryptographic algorithms, with an emphasis on Symmetric algorithms which …

[PDF][PDF] Security in cloud computing using cryptographic algorithms

SS Khan, RR Tuteja - … Journal of Innovative Research in Computer …, 2015 - academia.edu
… are the asymmetric algorithms. These security algorithms are currently used in a cloud computing
… enhancements like more efficient algorithms can be developed which can increase the …

[PDF][PDF] Analyzing data security for cloud computing using cryptographic algorithms

G Kaur, M Mahajan - International Journal of Engineering …, 2013 - academia.edu
security model for cloud computing. We propose a data security model based on studying of
cloud computing … select the suitable and highest security encryption algorithm. This software …

Cloud Computing Security For Algorithms

AA Abdulateef, AH Mohammed… - 2020 4th International …, 2020 - ieeexplore.ieee.org
… Various types of ML algorithms, for example ANN, K-NN, Naïve Bayes, SVM… security issues
in CC. We reviewed several proposed technologies that used ML algorithms for cloud security

[PDF][PDF] A review on cloud computing security

OI Omotosho - … Journal of Computer Science and Mobile Computing …, 2019 - academia.edu
… The cloud computing security models are also categorized under these models. Cloud
computing security model has three security and delivery models. The three types of cloud are …