A Singh, K Chatterjee - Journal of Network and Computer Applications, 2017 - Elsevier
The cloud computing provides on demand services over the Internet with the help of a large amount of virtual storage. The main features of cloud computing is that the user does not …
S Duggineni - Science and Technology, 2023 - researchgate.net
Data has changed and revolutionized the world around us. With the amount of data use and its need increasing every day, there comes an essential responsibility and a requirement of …
This analysis implements a strategic review on cloud computing environment confidentiality and privacy approaches. In an IT sector, the recently discovering phenomenal technology is …
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected to grow further with the improved technological innovations. However, the associated …
M Ali, SU Khan, AV Vasilakos - Information sciences, 2015 - Elsevier
The cloud computing exhibits, remarkable potential to provide cost effective, easy to manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …
N Cao, C Wang, M Li, K Ren… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility …
Using cloud storage, users can remotely store their data and enjoy the on-demand high- quality applications and services from a shared pool of configurable computing resources …
Cloud computing is very popular because of its unique features such as scalability, elasticity, on-demand service, and security. A large number of tasks are performed simultaneously in a …
C Wang, N Cao, K Ren, W Lou - IEEE Transactions on parallel …, 2011 - ieeexplore.ieee.org
Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data have to be encrypted before outsourced to the …