[PDF][PDF] Energy-efficient resource allocation and migration in private cloud data centre

R Dhaya, UJ Ujwal, T Sharma… - Wireless …, 2022 - pdfs.semanticscholar.org
Research Article Energy-Efficient Resource Allocation and Migration in Private Cloud Data Centre
Page 1 Research Article Energy-Efficient Resource Allocation and Migration in Private Cloud Data …

[HTML][HTML] A hybrid elliptic curve cryptography (HECC) technique for fast encryption of data for public cloud security

BR Rao, B Sujatha - Measurement: Sensors, 2023 - Elsevier
Cloud computing provides the users a centralized place for data storage and other
commercial applications. To guarantee everything is secure, cloud security has to handle all …

[PDF][PDF] Energy Cost Minimization Using String Matching Algorithm in Geo-Distributed Data Centers.

MI Khan Khalil, SA Ali Shah, IA Khan… - … , Materials & Continua, 2023 - researchgate.net
Data centers are being distributed worldwide by cloud service providers (CSPs) to save
energy costs through efficient workload allocation strategies. Many CSPs are challenged by …

IoE based private multi-data center cloud architecture framework

R Dhaya, R Kanthavel - Computers and Electrical Engineering, 2022 - Elsevier
This paper proposes an Internet of Everything (IoE) based private multi-data center cloud
architecture framework to utilize the merits of multi-data centers. The inclusive security …

An optimal cluster based intrusion detection system for defence against attack in web and cloud computing environments

KG Maheswari, C Siva, GN Priya - Wireless Personal Communications, 2023 - Springer
In recent years, the rapid growth of information technology organizations causes ability to
meet their demands such as scalability, mobility and flexibility. The security and privacy is a …

Laccolith: Hypervisor-Based Adversary Emulation with Anti-Detection

V Orbinato, MC Feliciano, D Cotroneo… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Advanced Persistent Threats (APTs) represent the most threatening form of attack nowadays
since they can stay undetected for a long time. Adversary emulation is a proactive approach …

AI Based Learning Model Management Framework for Private Cloud Computing

R Dhaya, R Kanthavel, K Venusamy - Journal of Internet Technology, 2022 - jit.ndhu.edu.tw
Artificial Intelligence (AI) systems are computational simulations that are “educated” using
knowledge and individual expert participation to replicate a decision that a professional …

Recent Challenges, Issues, and Initiatives for Cloud Computing Adoption in Healthcare: A Survey

F Al-Tawara, A Khalifeh - 2023 9th International Conference on …, 2023 - ieeexplore.ieee.org
There are many opportunities and advantages that cloud computing adoption can bring to
the healthcare field, as experts believe that it can help improve the level of healthcare …

Smart Facilities and 5G-Supported Systems in Social IoB

J Banumathi, SKB Sangeetha - Internet of Behaviors (IoB), 2023 - taylorfrancis.com
5G is the fifth-generation mobile network that delivers high data speeds, large network
capacity, low latency, and more reliability to users. Our phones can stream multiple movies …

A Survey on Secure Framework for Privacy-Preserving Over EHR in Cloud Environment

DN Joy, CS Yadav - Nanotechnology Perceptions, 2024 - nano-ntp.com
Abstract The" Health Service Provider (HSP)" sector is set to be revolutionized by the advent
of an emerging technology referred to as" Cloud Computing (CC)". CC's numerous upsides …