A three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing

T Wang, J Zhou, X Chen, G Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Recent years witness the development of cloud computing technology. With the explosive
growth of unstructured data, cloud storage technology gets more attention and better …

[PDF][PDF] Security framework of cloud data storage based on multi agent system architecture: Semantic literature review

AM Talib, R Atan, R Abdullah… - … and Information Science, 2010 - researchgate.net
The purpose of this literature review is to provide the information about illustrating the usage
of Multi-Agent System (MAS) techniques that can be beneficial in cloud computing platform …

A model of knowledge management system for facilitating knowledge as a service (KaaS) in cloud computing environment

R Abdullah, ZD Eri, AM Talib - 2011 International Conference …, 2011 - ieeexplore.ieee.org
Knowledge as a service (KaaS) is an emerging concept that integrates knowledge
management (KM), a knowledge organization, and knowledge markets. KaaS are programs …

[HTML][HTML] Towards a comprehensive security framework of cloud data storage based on multi agent system architecture

AM Talib, R Atan, R Abdullah, MAA Murad - Journal of Information …, 2012 - scirp.org
The tremendous growth of the cloud computing environments requires new architecture for
security services. Cloud computing is the utilization of many servers/data centers or cloud …

A hierarchic secure cloud storage scheme based on fog computing

J Zhou, T Wang, MZA Bhuiyan… - … , 3rd Intl Conf on Big Data …, 2017 - ieeexplore.ieee.org
Since the cloud computing technology was proposed, it has developed rapidly. Cloud
computing demonstrated that it was a major driver of change in the IT industry and there are …

A survey to build framework for optimize and secure migration and transmission of cloud data

R Bathini, N Vurukonda - Bulletin of Electrical Engineering and Informatics, 2024 - beei.org
In the recent era of computational technologies, the internet is needed daily. The data
generated is enormous and primarily stored on dedicated servers or clouds. Data migration …

[图书][B] End-User Cloud Data Storage Experiences, Challenges, and Security Perceptions of the Emerging Technologies Security Tools among Small Businesses

JCI Stewart - 2020 - search.proquest.com
The purpose of this qualitative research was to explore the small business end-users'
experiences and challenges with cloud data storage and security perceptions of cloud …

New security approach for IoT communication systems

BA Abdelhakim, BA Mohamed, B Mohammed… - Proceedings of the 3rd …, 2018 - dl.acm.org
The Security is a real permanent problem in wired and wireless communication systems.
This issue becomes more and more complex in the internet of things context where the …

Security Analysis and Fraud Prevention in Cloud Computing

MI Ali, P Jha, A Sharma, S Kaur - The Role of IoT and Blockchain, 2022 - taylorfrancis.com
Cloud services nowadays became an essential requirement for the IT infrastructure to meet
the demand for any organization's growth and dynamic changes. Organizations are focusing …

[PDF][PDF] Halal Knowledge Grid Model for Promoting Knowledge Sharing Among Their Community of Practice

R Abdullah - International conference on emerging trends in …, 2014 - academia.edu
The power of knowledge management (KM) as a system in capturing, storing, disseminating,
and use knowledge for the benefits of its community of practice (CoP) can't be debated …