[PDF][PDF] An Asset-Based Approach to Mitigate Zero-Day Ransomware Attacks.

F Azzedin, H Suwad, MM Rahman - Computers, Materials & …, 2022 - cdn.techscience.cn
This article presents an asset-based security system where security practitioners build their
systems based on information they own and not solicited by observing attackers' behavior …

A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm

G Sugitha - Peer-to-Peer Networking and Applications, 2024 - Springer
Maximizing the security of the cloud system is most important need of this world. Similarly,
the data controllers are also increased stealing the sensitive and personal data from the …

[HTML][HTML] Privacy-preserving edge computing offloading scheme based on whale optimization algorithm

Z Liu, J Wang, Z Gao, J Wei - The Journal of Supercomputing, 2023 - Springer
Aiming at the problem of user's task offloading in mobile edge computing and the potential
leakage of location privacy during the offloading process, a privacy-preserving computing …

A Key Based Hybrid Approach for Privacy and Integrity in Multi-Cloud

MD Abdul-Jabbar - Iraqi Journal of Science, 2023 - ijs.uobaghdad.edu.iq
Before users store data in the cloud, many security issues must be addressed, as they will
have no direct control over the data that has been outsourced to the cloud, particularly …

Comprehensive Review: Security Challenges and Countermeasures for Big Data Security in Cloud Computing

A Kaur, A Dhiman, M Singh - 2023 7th International …, 2023 - ieeexplore.ieee.org
As big data becomes increasingly prevalent in the cloud computing, ensuring the security of
data becomes paramount. This comprehensive review paper explores the security …