Research on strong agile response task scheduling optimization enhancement with optimal resource usage in green cloud computing

W Shu, K Cai, NN Xiong - Future Generation Computer Systems, 2021 - Elsevier
Virtualization technology provides a new way to improve resource utilization and cloud
service throughput. However, the randomness of task arrival, tight coupling between …

A review on cybersecurity of cloud computing for supporting connected vehicle applications

MS Salek, SM Khan, M Rahman… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
In an Internet of Things (IoT) environment, cloud computing is emerging as a technologically
feasible and economically viable solution for supporting real-time and non-real-time …

Cloudlet-enabled wireless body area networks (WBANs): a systematic review, architecture, and research directions for QoS improvement

T Bhardwaj, C Reyes, H Upadhyay, SC Sharma… - International Journal of …, 2022 - Springer
Wireless body area networks (WBANs), mobile devices and cloud computing are the
backbone technologies of pervasive healthcare systems. WBANs ecosystem possesses …

Modified RSA-based algorithm: A double secure approach

I Al_Barazanchi, SA Shawkat… - TELKOMNIKA …, 2019 - telkomnika.uad.ac.id
Security algorithms like RSA are becoming increasingly important for communications to
provide companies, organizations, and users around the world, secure applications who rely …

An asymmetric and optimized encryption method to protect the confidentiality of 3D mesh model

Y Liang, F He, H Li - Advanced Engineering Informatics, 2019 - Elsevier
Abstract 3D models are widely used in computer graphics, design and manufacture
engineering, art animation and entertainment. With the universal of acquisition equipment …

Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks

M Noroozi, Z Eslami - Journal of Ambient Intelligence and Humanized …, 2020 - Springer
In public-key setting, the problem of searching for keywords in encrypted data is handled by
the notion of public-key encryption with keyword search (PEKS). An important challenge in …

A planned scheduling process of cloud computing by an effective job allocation and fault-tolerant mechanism

MK Malik, A Singh, A Swaroop - Journal of Ambient Intelligence and …, 2022 - Springer
In the scientific world, cloud computing is utilized for several applications like financial,
healthcare biomedical systems, and so on. However, the chief drawback behind in cloud …

Refining word embeddings with sentiment information for sentiment analysis

M Kasri, M Birjali, M Nabil… - Journal of ICT …, 2022 - ieeexplore.ieee.org
Natural Language Processing problems generally require the use of pretrained distributed
word representations to be solved with deep learning models. However, distributed …

A Review on Cloud Data Security Challenges and existing Countermeasures in Cloud Computing

P Singh, AK Pandey - International Journal of Data Informatics and …, 2022 - ijdiic.com
Cloud computing (CC) is among the most rapidly evolving computer technologies. That is
the required accessibility of network assets, mainly information storage with processing …

Fast Cloud–Paillier homomorphic schemes for protecting confidentiality of sensitive data in cloud computing

K El Makkaoui, A Ezzati, A Beni-Hssane… - Journal of Ambient …, 2020 - Springer
With homomorphic encryption (HE), data can be processed in its encrypted form in the cloud
computing (CC). This HE property can be considered as a useful solution to get over some …