A systematic literature review on cloud computing security: threats and mitigation strategies

B Alouffi, M Hasnain, A Alharbi, W Alosaimi… - Ieee …, 2021 - ieeexplore.ieee.org
Cloud computing has become a widely exploited research area in academia and industry.
Cloud computing benefits both cloud services providers (CSPs) and consumers. The …

[HTML][HTML] Security and privacy in cloud computing: technical review

YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …

Diagnosis of Brain Tumor Using Light Weight Deep Learning Model with Fine‐Tuning Approach

T Shelatkar, Urvashi, M Shorfuzzaman… - … Methods in Medicine, 2022 - Wiley Online Library
Brain cancer is a rare and deadly disease with a slim chance of survival. One of the most
important tasks for neurologists and radiologists is to detect brain tumors early. Recent …

A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption

D Unal, A Al-Ali, FO Catak, M Hammoudeh - Future Generation Computer …, 2021 - Elsevier
Data security is a challenge for end-users of cloud services as the users have no control
over their data once it is transmitted to the cloud. A potentially corrupt cloud service provider …

Risk monitoring strategy for confidentiality of healthcare information

M Rizwan, A Shabbir, AR Javed, G Srivastava… - Computers and …, 2022 - Elsevier
Concrete privacy endeavours to give Confidentiality, Integrity, and Availability (CIA)
measures to secure traffic streams in sensitive healthcare applications are a necessity …

[HTML][HTML] Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme

JK Dawson, F Twum, JB Hayfron Acquah, YM Missah - Plos one, 2023 - journals.plos.org
The amount of data generated by electronic systems through e-commerce, social networks,
and data computation has risen. However, the security of data has always been a challenge …

[HTML][HTML] A new hybrid automated security framework to cloud storage system

NE El-Attar, DS El-Morshedy, WA Awad - Cryptography, 2021 - mdpi.com
The need for cloud storage grows day after day due to its reliable and scalable nature. The
storage and maintenance of user data at a remote location are severe issues due to the …

Morphological transfer learning based brain tumor detection using YOLOv5

SK Pandey, AK Bhandari - Multimedia Tools and Applications, 2024 - Springer
Medical experts require an efficient tool that provides highly accurate diagnoses of patients
for early and precise detection of the severity of brain tumours using brain magnetic …

Cloud key management based on verifiable secret sharing

M Hedabou - Network and System Security: 15th International …, 2021 - Springer
Managing encryption keys in cloud computing is a very challenging task, especially where
the model is shared and entirely controlled by the cloud providers. Hardware Security …

[HTML][HTML] Multi-objective optimization design of steel structure building energy consumption simulation based on genetic algorithm

Y Ren, S Rubaiee, A Ahmed, AM Othman… - Nonlinear …, 2022 - degruyter.com
In order to solve the problems of data acquisition, quantitative analysis and model solving in
the field of construction schedule optimization, a construction schedule optimization system …