A secure VM live migration technique in a cloud computing environment using blowfish and blockchain technology

A Gupta, S Namasudra, P Kumar - The Journal of Supercomputing, 2024 - Springer
Data centres have become the backbone of infrastructure for delivering cloud services. In
the emerging cloud computing paradigm, virtual machine (VM) live migration involves …

DL-HIDS: deep learning-based host intrusion detection system using system calls-to-image for containerized cloud environment

N Joraviya, BN Gohil, UP Rao - The Journal of Supercomputing, 2024 - Springer
In the rapidly evolving IT industry, containerization has introduced new security challenges
including cloud data breaches. DL-HIDS explores the application of Deep Learning (DL) …

Secure and fine-grained access control of electronic health record using SAPCP-ABE technique in cloud

A Pandiyarajan, SK Jagatheesaperumal… - Journal of Intelligent & … - content.iospress.com
This study explores how Electronic Health Records (EHR) might be transformed in the
context of the rapid improvements in cloud computing and IoT technology. But worries about …

QUEUING AND SCHEDULING IN CLOUD COMPUTING

H Chaudhary, G Sharma - Zibaldone Estudios italianos, 2024 - zibaldone.cfd
Cloud computing is a prevalent computing model that facilitates on-demand services. The
services are offered on a pay-per-use model. The primary objective of cloud service …