Machine learning based deep job exploration and secure transactions in virtual private cloud systems

S Rajasoundaran, AV Prabu, S Routray… - Computers & …, 2021 - Elsevier
Abstract Virtual Private Cloud (VPC) is an emerging cloud environment used to provide
more secure data communication. VPC provides authentic communication channel for …

A survey on identity and access management for cross-domain dynamic users: issues, solutions, and challenges

A Badirova, S Dabbaghi, FF Moghaddam… - IEEE …, 2023 - ieeexplore.ieee.org
Access control management in a heterogeneous cloud environment, where the number of
users is growing, is a daunting task for service providers. Efficiency is heavily reliant on …

Extreme learning with projection relational algebraic secured data transmission for big cloud data

G Sakthivel, P Madhubala - Concurrency and Computation …, 2024 - Wiley Online Library
Cloud Computing (CC) and big data are growing technology in the business. Big data is
demonstrated in terms of volume, variety, and velocity. CC is employed for storing …

[图书][B] Cyber Security Applications for Industry 4.0

R Sujatha, G Prakash, NZ Jhanjhi - 2022 - books.google.com
Cyber Security Applications for Industry 4.0 (CSAI 4.0) provides integrated features of
various disciplines in Computer Science, Mechanical, Electrical, and Electronics …

Systematic Literature Review: Key Management Service For Securing Encryption Key

A Susanto, AH Fathulloh… - 2023 11th International …, 2023 - ieeexplore.ieee.org
This paper utilizes the Systematic Literature Review (SLR) method to investigate and
analyze the key management services employed for securing encryption keys, as well as the …

A hierarchical multicast key distribution protocol

J Li, S Yao, J Liu, Y Wu - Electronics, 2021 - mdpi.com
In secure group communication, group keys (GK) are used to ensure the confidentiality of
communication. The group key distribution (GKD) is responsible for updating and …

Quorum and non-quorum based hierarchical multi-authority access control scheme for secure data sharing in cloud based environment

SA Parte, R Thakur - Sādhanā, 2024 - Springer
In the present time, cloud platforms are gaining more popularity for outsourcing features. So,
many public or private organizations are fascinated towards cloud technology since it can …

Deep multilayer percepted policy attribute Lamport certificateless signcryption for secure data access and sharing in cloud

J Mala, AN Jayanthi - Distributed and Parallel Databases, 2022 - Springer
Data sharing is a method that allows users to legally access data over the cloud. Cloud
computing architecture is used to enable the data sharing capabilities only to the authorized …

A Higher Level Security Protocol for Cloud Computing

B Celiktas, İ Çelikbilek… - 2019 4th International …, 2019 - ieeexplore.ieee.org
In this work, we construct a cloud-independent protocol which allows any public cloud
system to be used as the private. While designing the protocol, we aim to provide both more …

A Theoretical Framework on Enhancing Cloud Storage Security through Customized ECC Key Management Technique

G Prakash, M Kiruthigga - Cyber Security Applications for Industry …, 2022 - taylorfrancis.com
This chapter discusses the Cloud consumer's data protection using Cryptographic Keys
which have to be provided by the Cloud Service Provider (CSP). The persistent …