Analyzing and evaluating critical challenges and practices for software vendor organizations to secure big data on cloud computing: An AHP-based systematic …

AW Khan, MU Khan, JA Khan, A Ahmad, K Khan… - IEEE …, 2021 - ieeexplore.ieee.org
Recently, its becomes easy to track down the data due to its availability in a large number.
Although for data management, processing, and obtainability, cloud computing is …

From cloud computing security towards homomorphic encryption: A comprehensive review

SJ Mohammed, DB Taha - … Computing Electronics and Control …, 2021 - telkomnika.uad.ac.id
Abstract “Cloud computing” is a new technology that revolutionized the world of
communications and information technologies. It collects a large number of possibilities …

Data security in cloud computing using AES under HEROKU cloud

BH Lee, EK Dewi, MF Wajdi - 2018 27th wireless and optical …, 2018 - ieeexplore.ieee.org
Cloud security is an evolving sub-domain of computer and network security. Cloud platform
utilizes third-party data centers model. An example of cloud platform as a service (PaaS) is …

Fortified mapreduce layer: elevating security and privacy in big data

M Gupta, RK Dwivedi - EAI Endorsed Transactions on Scalable …, 2023 - publications.eai.eu
In today's digital landscape, the widespread sharing and utilization of raw data are integral
in social, medical, agricultural, and academic domains. The surge of open platforms has led …

[HTML][HTML] A proposed secure framework for protecting cloud-based educational systems from hacking

H El-Sofany, SA El-Seoud, OH Karam… - Egyptian Informatics …, 2024 - Elsevier
Educational institutions and users involved in the whole learning process frequently have
concerns about the storage and processing of sensitive data and essential apps in the …

Securing data and reducing the time traffic using AES encryption with dual cloud

P Sivakumar, M NandhaKumar… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Cloud security is a developing part of computer devices and network security. Cloud
platform usage is for third-person information model. In Here we talk about how to provide …

Privacy-Preserving Machine Learning in Cloud-Edge-End Collaborative Environments

W Yang, H Wang, Z Li, Z Niu, L Wu… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
We propose a privacy-preserving machine learning scheme based on the cloud-edge–end
architecture to address issues like weak computing power of Internet of Things (IoT) …

Six Years of Shiny in Research-Collaborative Development of Web Tools in R.

P Kasprzak, L Mitchell, O Kravchuk, A Timmins - R Journal, 2020 - search.ebscohost.com
The use of Shiny in research publications is investigated over the six and a half years since
the appearance of this popular web application framework for R, which has been utilised in …

Adaptation and effects of cloud computing on small businesses

D KARAGOZLU, J AJAMU… - Brain. Broad research in …, 2020 - lumenpublishing.com
One of the popular technologies in the industry today is cloud computing and the use of
cloud computing in small businesses is now fashionable, it has a remarkable impact on …

Energy Efficient Real-Time E-Healthcare System Based on Fog Computing

F Islam, T Akand, S Kabir - Journal of Computational and …, 2024 - ojs.bonviewpress.com
The rapid development of Internet of Things (IoT)-enabled systems in public and private
spaces offers consumers numerous conveniences. Among different Internet-connected …