Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud

MB Qureshi, MS Qureshi, S Tahir, A Anwar, S Hussain… - Symmetry, 2022 - mdpi.com
With technological advancement, cloud computing paradigms are gaining massive
popularity in the ever-changing technological advancement. The main objective of the cloud …

[PDF][PDF] Blockchain Merkle-Tree Ethereum Approach in Enterprise Multitenant Cloud Environment.

P Dhiman, SK Henge, S Singh, A Kaur… - … Materials & Continua, 2023 - cdn.techscience.cn
This research paper puts emphasis on using cloud computing with Blockchain (BC) to
improve the security and privacy in a cloud. The security of data is not guaranteed as there is …

Data Prevention Protocol for Cloud Computing Security Using Blockchain Technology

P Mishra, R Ganesan - … on Information and Communication Technology for …, 2023 - Springer
Cloud computing is a new developing paradigm which provides many platforms to
researchers. It is a promising technology which has continuously revolutionized different …

A systematic literature review on contemporary and future trends in virtual machine scheduling techniques in cloud and multi-access computing

N Rana, F Jeribi, Z Khan, W Alrawagfeh… - Frontiers in Computer …, 2024 - frontiersin.org
Introduction The migration of business and scientific operations to the cloud and the surge in
data from IoT devices have intensified the complexity of cloud resource scheduling …

Secured Dynamic Request Scheduling and Optimal CSP Selection for Analyzing Cloud Service Performance Using Intelligent Approaches

MA Khan, SM Khan, SK Subramaniam - IEEE Access, 2023 - ieeexplore.ieee.org
Due to its heterogeneity, cloud services providers'(CSPs) rapid expansion presents several
challenges, such as optimal service selection and privacy preservation. Multiple users using …

Migrating data to the cloud: An analysis of cloud storage privacy and security issues and solutions

M Kuštelega, R Mekovec - CroDiM: International Journal of Marketing …, 2024 - hrcak.srce.hr
Sažetak The rise of a digital economy has transformed how individuals do business and
carry out daily tasks, including how data is maintained. Because of the vast amount of data …

[Retracted] Implementation of Cloud Computing Protocol in E‐Learning for Future Wireless Systems

L Hou, Q Liu, J Nebhen, M Uddin… - … and Mobile Computing, 2022 - Wiley Online Library
Schooling system is rapidly shifting according to time. The 4G and 5G machineries are
engineered to work flawlessly in heterogeneous platforms unlike 2G, 3G, and 4G wireless …

Blockchain Security for Fog Computing and Internet of Things

AK Jumani, WA Siddique, MF Siddiqui… - Fog Computing for …, 2024 - Wiley Online Library
The Blockchain network is used to send and receive data for creating tamper‐proof records
of shared agreements. This technology ensures that the data is stored securely and cannot …

Метод шифрування даних в хмарних сервісах

П Мельник - 2023 - dspace.wunu.edu.ua
Кваліфікаційна робота на тему «Метод шифрування даних в хмарних сервісах» на
здобуття освітнього ступеня «Магістр» зі спеціальності 125 «Кібербезпека» освітньо …

Virtual Blockchain Network for Secure Financial and Industrial Applications

A Bogdanov, V Khvatov, A Uteshev… - … Science and Its …, 2024 - Springer
This study introduces blockchain virtualization as a solution to tackle modern challenges.
Evaluating the DGT network as a model, experiments probe the impact of virtualization …