Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey

S Anwar, Z Inayat, MF Zolkipli, JM Zain, A Gani… - Journal of Network and …, 2017 - Elsevier
The state-of-the-art Cloud Computing (CC) has been commercially popular for shared
resources of third party applications. A cloud platform enables to share resources among …

Accelerating content-defined-chunking based data deduplication by exploiting parallelism

W Xia, D Feng, H Jiang, Y Zhang, V Chang… - Future Generation …, 2019 - Elsevier
Data deduplication, a data reduction technique that efficiently detects and eliminates
redundant data chunks and files, has been widely applied in large-scale storage systems …

Designing monitoring systems for continuous certification of cloud services: Deriving meta-requirements and design guidelines

S Lins, S Schneider, J Szefer, S Ibraheem… - Communications of the …, 2019 - aisel.aisnet.org
Continuous service certification (CSC) involves the consistently gathering and assessing
certification-relevant information about cloud service operations to validate whether they …

Event-based sensor data exchange and fusion in the Internet of Things environments

C Esposito, A Castiglione, F Palmieri, M Ficco… - Journal of Parallel and …, 2018 - Elsevier
Abstract Internet of Things (IoT) is a promising technology for improving our lives and society
by integrating smart devices in our environment and paving the way for novel ICT …

Lattice assumption based fuzzy information retrieval scheme support multi-user for secure multimedia cloud

Y Yang, X Zheng, V Chang, S Ye, C Tang - Multimedia Tools and …, 2018 - Springer
Multimedia cloud is novel computation paradigm which could leverage cloud infrastructure
to store large quantity of multimedia documents and respond on the requests from …

Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC

DVK Vengala, D Kavitha, APS Kumar - Cluster Computing, 2020 - Springer
The cloud computing (CC) model is diverse as well as has broad phenomena because of
which it is being preferred widely. Due to security challenges, the user cannot utilize CC to …

Towards an improved Adaboost algorithmic method for computational financial analysis

V Chang, T Li, Z Zeng - Journal of Parallel and Distributed Computing, 2019 - Elsevier
Abstract Machine learning can process data intelligently, perform learning tasks and predict
possible outputs in time series. This paper presents the use of our proposed machine …

Analytical review of data security in cloud computing

M Joshi, S Budhani, N Tewari… - 2021 2nd International …, 2021 - ieeexplore.ieee.org
All the organization wants to implement the same security parameters as they are already
using with their internal data/resources. It is mandatory to understand and find the data …

[HTML][HTML] Cloud, edge, and mobile computing for smart cities

Q Liu, J Gu, J Yang, Y Li, D Sha, M Xu, I Shams, M Yu… - Urban Informatics, 2021 - Springer
Smart cities evolve rapidly along with the technical advances in wireless and sensor
networks, information science, and human–computer interactions. Urban computing …