SA2-MCD: Secured architecture for allocation of virtual machine in multitenant cloud databases

AK Yadav, RK Bharti, RS Raw - Big Data Research, 2021 - Elsevier
Cloud computing is one of the most demanding technology in today's era. At one side,
where cloud computing is offering unlimited amount of IT resources to provide exceptional …

DPC2-CD: a secure architecture and methods for distributed processing and concurrency control in cloud databases

AK Yadav, RS Raw, RK Bharti - Cluster Computing, 2023 - Springer
Multi-tenant public cloud architecture is plagued by numerous security issues in cloud
computing, including host access restrictions, unlawful access, and data security. The …

CBAC4C: conflict‐based VM isolation control for cloud computing

MT Dlamini, JHP Eloff, HS Venter… - … in Operational Research, 2022 - Wiley Online Library
For businesses to benefit from the many opportunities of cloud computing, they must first
address a number of security challenges, such as the potential leakage of confidential data …

Comprehensive Method of Distributed Denial of Service Detection by Artificial Neural Network

K Kumar, M Khari, A Kumar - Wireless Communication with …, 2022 - taylorfrancis.com
Security in information plays a significant role in producing innocuous and secure
communication by rapid improvement to information technology. There are various kinds of …

A Hybrid Cryptography Technique with Blockchain for Data Integrity and Confidentiality in Cloud Computing

KL Neela, RK Ramesh - … Computing Enabled Big-Data Analytics in …, 2022 - taylorfrancis.com
Cloud computing is one of the prominent areas in today's world. Several advantages exist in
cloud computing, but the major drawback is that it is difficult to build a secure cloud storage …

Threats and Countermeasures in Digital Crime and Cyberterrorism

M Kumar, RS Raw, B Nagpal - Computational Intelligent Security …, 2023 - taylorfrancis.com
In the current era of the cyber space or cyber world, threats are the most difficult thing to
handle in which we have to maintain and manage the cyber security system to not get …

Deployment of the Biometrics-as-a-Service (BaaS) Design for the Internet of Biometric Things (IoBT) on the AWS Cloud

VA Bharadi, TS Kedar, PS Jangid… - … Computing Enabled Big …, 2022 - taylorfrancis.com
Distributed computing has opened numerous opportunities for the plan and execution of
different models of programming for tending to an assortment of issues. Biometric verification …

8 Deployment of the

VA Bharadi, TS Kedar, PS Jangid… - … Computing Enabled Big …, 2022 - books.google.com
Biometric implies recognizing natural body structure identified with an individual or conduct
highlights. Biometric system identifies human by consistent localization and feature …

KL Neela

RK Ramesh - Cloud Computing Enabled Big-Data Analytics in …, 2022 - books.google.com
A mainframe computer is mainly used to handle a huge amount of data. Several end users
can access the data in a centralized manner. Mainframe computer systems are expensive …

Load Balancing Based on Estimated Finish Time of Services

R Sachdeva - Cloud Computing Enabled Big-Data Analytics in …, 2022 - taylorfrancis.com
Cloud computing is ace of the widely used paradigm in the arena of Computer Science.
Using Cloud computing, different Infrastructure/Software/platform services are delivered to …