SQL and NoSQL database software architecture performance analysis and assessments—a systematic literature review

W Khan, T Kumar, C Zhang, K Raj, AM Roy… - Big Data and Cognitive …, 2023 - mdpi.com
The competent software architecture plays a crucial role in the difficult task of big data
processing for SQL and NoSQL databases. SQL databases were created to organize data …

[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges

I Indu, PMR Anand, V Bhaskar - Engineering science and technology, an …, 2018 - Elsevier
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …

Ensuring user authentication and data integrity in multi-cloud environment

L Megouache, A Zitouni, M Djoudi - Human-centric Computing and …, 2020 - Springer
The necessity to improve security in a multi-cloud environment has become very urgent in
recent years. Although in this topic, many methods using the message authentication code …

Performance comparison of signed algorithms on JSON Web Token

A Rahmatulloh, R Gunawan… - IOP Conference Series …, 2019 - iopscience.iop.org
The system survive in this digital era is a system that can work on multiple platforms, the use
of web services is one of the solution. Exchange data using JSON format and for the security …

Framework of data privacy preservation and location obfuscation in vehicular cloud networks

H Al‐Balasmeh, M Singh… - … and Computation: Practice …, 2022 - Wiley Online Library
The leakage of sensitive data of users and global positioning system location trajectories
from different cloud computation sources have increased in daily lives. This critical problem …

The Design Blueprint for a Large‐Scale Telehealth Platform

R Poonsuph - International Journal of Telemedicine and …, 2022 - Wiley Online Library
Technological innovation plays a crucial role in digital healthcare services. A growing
number of telehealth platforms are concentrating on using digital tools to improve the quality …

Enhancing the access privacy of IDaaS system using SAML protocol in fog computing

C Rupa, R Patan, F Al-Turjman, L Mostarda - IEEE Access, 2020 - ieeexplore.ieee.org
Fog environment adoption rate is increasing day by day in the industry. Unauthorized
accessing of data occurs due to the preservation of Identity and information of the users …

[PDF][PDF] Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.

SS Pericherla - ISC Int. J. Inf. Secur., 2023 - researchgate.net
Cloud computing created a revolution in the way IT organizations and IT teams manage their
internal digital resources and workloads. One major drawback or limitation of cloud …

DAuth—Delegated Authorization Framework for Secured Serverless Cloud Computing

P Padma, S Srinivasan - Wireless Personal Communications, 2023 - Springer
Serverless computing which is known as Function as a service becomes a new form of cloud
computing. In recent days it enables the components of cloud applications to run on multiple …

Holistic authentication framework for virtual agents; UK banking industry

HH Hettiarachchige, H Jahankhani - Challenges in the IoT and Smart …, 2021 - Springer
The exponential growth and advancements of information technology and artificial
intelligence significantly enhance the capabilities of virtual agents. This creates …