V Devi Satya Sri, S Vemuru - Smart Technologies in Data Science and …, 2023 - Springer
Data replication-based cloud data access control mechanism plays a major role in real-time cloud computing environment due to high computational cost and memory. Hybrid data …
VDS Sri, S Vemuru - Artificial Intelligence for Smart Healthcare, 2023 - Springer
Multiuser-based data replication and partitioning strategy play a vital role in real-time cloud- based medical computing systems. However, most data replication and partitioning …
In cloud computing, dynamic storage of data generated by users, applications, tasks, workflows, etc. requires frequent access operations, so traditional encryption cannot be …
M Singh, S Gond - NeuroQuantology, 2021 - search.proquest.com
Cloud computing technology enables users to deploy shared infrastructure and services. The internet and other public networks must be used in order to build up a public cloud. The …
Machine learning plays a vital role in the real-time cloud based medical computing systems. However, most of the computing servers are independent of data security and recovery …
A SINGH, S SINGHAL - European Journal of Molecular & Clinical Medicine - academia.edu
SAAS (Storage as a service) is a prominent cloud computing service that helps the cloud users to overcome the bounded resources and the storage expansion by advancing the …
SA Fadhil, LE Kadhim, MH Salman - researchgate.net
Machine learning plays a vital role in the real-time cloud based medical computing systems. However, most of the computing servers are independent of data security and recovery …
VDS Sri, S Vemuru - International Journal of Communication …, 2022 - search.proquest.com
Abstract Machine learning has been supporting real-time cloud based medical computing systems. However, most of the computing servers are independent of data security and …
A Sathya, SKS Raja - Wireless Personal Communications, 2021 - Springer
Cloud service providers emphasize the concept of virtual machines, wherein resources and services are accessed over a distributed network system. The loss of user privacy is indeed …