A review of machine learning algorithms for cloud computing security

UA Butt, M Mehmood, SBH Shah, R Amin, MW Shaukat… - Electronics, 2020 - mdpi.com
Cloud computing (CC) is on-demand accessibility of network resources, especially data
storage and processing power, without special and direct management by the users. CC …

[HTML][HTML] Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends

MM Belal, DM Sundaram - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, machine learning and deep learning algorithms are used in recent studies as
active security techniques instead of traditional ones to secure the cloud environment based …

CryptoGA: a cryptosystem based on genetic algorithm for cloud data security

M Tahir, M Sardaraz, Z Mehmood, S Muhammad - Cluster Computing, 2021 - Springer
Cloud Computing is referred to as a set of hardware and software that are being combined
to deliver various services of computing. The cloud keeps the services for delivery of …

Towards an intelligent intrusion detection system to detect malicious activities in cloud computing

H Attou, M Mohy-eddine, A Guezzaz, S Benkirane… - Applied Sciences, 2023 - mdpi.com
Several sectors have embraced Cloud Computing (CC) due to its inherent characteristics,
such as scalability and flexibility. However, despite these advantages, security concerns …

[PDF][PDF] Exploring cloud computing adoption in higher educational environment: an extension of the UTAUT model with trust

M Jaradat, HT Ababneh, KM Faqih… - International Journal of …, 2020 - researchgate.net
The latest advancements in digital technologies have pushed most enterprises and
individuals to purposefully and proactively pursue and adopt a new technology format …

Security and detection mechanism in IoT-based cloud computing using hybrid approach

M Vashishtha, P Chouksey, DS Rajput… - … Journal of Internet …, 2021 - inderscienceonline.com
The combination of RSA and RC4 is accepted for the generation of key to get the superior
security method, on image, blowfish algorithm is applied. In this method, initially cloud …

Disaster recovery techniques in cloud computing

AA Tamimi, R Dawood, L Sadaqa - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
Electronic data has been created today in large quantities requiring data recovery services
organization's work may experience the various type of disasters whether it was natural or …

Efficacious Novel Intrusion Detection System for Cloud Computing Environment

P Rana, I Batra, A Malik, IH Ra, OS Lee… - IEEE …, 2024 - ieeexplore.ieee.org
Rife acceptance of Cloud Computing has made it bull's eye for the hackers. Intrusion
detection System (IDS) plays a vibrant role for it. Researchers have done marvelous works …

Inter‐Cloud Data Security Framework to Build Trust Based on Compliance with Controls

SI Akhtar, A Rauf, MF Amjad, I Batool - IET Information Security, 2024 - Wiley Online Library
Prospects of cloud computing as a technology that optimizes resources, reduces complexity,
and provides cost‐effective solutions to its consumers are well established. The future of …

Security threats and challenges in public cloud storage

G Nagarajan, KS Kumar - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Cloud computing is a modern way for many businesses to offer computing tools and
services that have transformed their business at a low cost. But the main concern is …