Secure cloud-mediator architecture for mobile-government using RBAC and DUKPT

Q Kharma, N Turab, Q Shambour, M Hassan - 2020 - learntechlib.org
Smart mobile devices and cloud computing are widely used today. While mobile and
portable devices have different capabilities, architectures, operating systems, and …

An efficient image encryption method based on improved cipher block chaining in cloud computing as a security service

J Mahalakshmi, K Kuppusamy - Australian Journal of Basic and …, 2016 - papers.ssrn.com
Background: Cloud computing offers numerous services to users on demand, and gains it
significance in current era. Securing the information stored in the cloud data center is one of …

[PDF][PDF] Model Pemantauan Penggunaan Lahan dan Tutupan Lahan yang Efisien di Indonesia Berbasis Data Penginderaan Jauh

M Dimyati - 2023 - geografi.ui.ac.id
Data penginderaan jauh semakin bervariasi, baik resolusi spasial, spektral, temporal dan
radiometriknya. Aksessibilitas data penginderaan jauh oleh publik pun semakin meningkat …

[PDF][PDF] Role of Cryptography & its Related Techniques in Cloud Computing Security

GK Kumar, M Gobi - International Journal for Research in Applied …, 2017 - academia.edu
Cloud Computing is a fast-growing area and its security issues block the prevalence widely.
The organizations are lethargic in accepting it due to these issues and challenges …

A New Approach for Security in Cloud Data Storage for IOT Applications Using Hybrid Cryptography Technique

R Pavithra, S Prathiksha, SG Shruthi… - Advances in Parallel …, 2021 - ebooks.iospress.nl
The most demanded advanced technology throughout the world is cloud computing. It is one
of the most significant topics whose application is being researched in today's time. Cloud …

Effective binary cuckoo search optimization based cloud brokering mechanism on cloud

DMM Vianny, M Aramudhan… - … Conference on IoT and …, 2017 - ieeexplore.ieee.org
The service gave by cloud computing continues expanding and henceforth keeping in mind
the end goal to diminish the weight of clients and suppliers on managing distinctive cloud …

[PDF][PDF] Importance of hash value in security of cloud storage

SD Ghule, A Girdhar - Cyber Times Int J Technol Manag, 2018 - journal.cybertimes.in
Cloud computing is an emerging technology that can allow user's large amount of data to
store in cloud and it can be access from anywhere. There are two important aspects of cloud …

[PDF][PDF] Implementing Multiple Security in the Cloud Environment

D Anuradha, S Sangwan - International journal of Advance research. Ideas …, 2016 - Citeseer
Cloud computing is continuously evolving and considered next generation architecture for
computing. Typically, cloud computing is a combination of computing resources accessible …

Security analysis in cloud computing environment

S Adeppa - Indian Journal of Scientific Research, 2015 - go.gale.com
Security has become an essential and important paradigm in data services that provided by
various clouds. Data need to be stored and manipulated very confidentially and without data …

[PDF][PDF] Emerging Security Breaches and their Counter Measures

PK Vishwakarma - Institute of Innovation in Technology & Management, 2019 - iitmjp.ac.in
Emerging Security Breaches and their Counter Measures Page 7 Emerging Security Breaches
and their Counter Measures Prabhat Kumar Vishwakarma prof. dr. prabhat@ gmail. com …