Security and detection mechanism in IoT-based cloud computing using hybrid approach

M Vashishtha, P Chouksey, DS Rajput… - … Journal of Internet …, 2021 - inderscienceonline.com
The combination of RSA and RC4 is accepted for the generation of key to get the superior
security method, on image, blowfish algorithm is applied. In this method, initially cloud …

A hybrid security approach based on AES and RSA for cloud data

B Kumar, J Boaddh, L Mahawar - International Journal of …, 2016 - search.proquest.com
In this paper we have proposed an efficient and secure cloud computing framework which
support security for the cloud users and data control is being provided at the cloud user side …

Secure data communication in client-cloud environment: A survey

D Soni, M Kumar - 2017 7th International Conference on …, 2017 - ieeexplore.ieee.org
The use of cloud computing platform is growing now days. It is used in all the area of
Education, Business, Web Domain and Data Servers. The developing interest is a direct …

[PDF][PDF] An automated cloud security framework based on FCM in user-cloud environment

D Soni, M Kumar - International Journal of Engineering and …, 2019 - academia.edu
In this paper an efficient secure cloud computing framework has been developed. This
framework consists of data grouping based on fuzzy c-means (FCM). It has been used for …

A meta-analysis on secure cloud computing

B Kumar, J Boaddh - International Journal of Advanced …, 2016 - search.proquest.com
In today's era there is a vast demand of cloud computing because of the easy to maintain
infrastructure with low cost. It is used in several areas including University, Hospital, E …

[PDF][PDF] Cloud computing security: a survey

S Mahalle, R Jaiswal - International Journal of Computer Applications, 2015 - Citeseer
Due to volume output, easy access of information, less time more work to be done,
virtualization technique and pay per use increase the use of cloud computing in today's era …

[PDF][PDF] Secure cloud computing with RC4 encryption and attack detection mechanism

L Mishra, A Sharma - International Journal of Computer Applications, 2015 - Citeseer
The growing requirement of system resources, memory requirement and huge space etc.
have sprinted up the demand of cloud computing. The ease in the use and dynamic demand …

Security of text data outsourcing in cloud computing

S Bhute, SK Arjaria - International Journal of Advanced …, 2016 - search.proquest.com
Cloud computing is a computing based on internet. Demand of cloud computing is
increasing day by day. Cloud computing is on demand service with lower cost. Many …

A Security Model for Cloud-computing-based E-governance Applications

A Makwe, A More, P Kanungo… - Cyber-Physical, IoT, and …, 2021 - taylorfrancis.com
New communication trends can make a noteworthy contribution in achieving the goal of
good governance. E-governance-based applications require computing models for …

[PDF][PDF] Secure Cloud Computing with Third Party Auditing: A Survey

L Mishra, AK Sharma - International Journal of Computer Applications, 2014 - Citeseer
Cloud computing based technology and their impact is growing now a day. Cloud computing
is used in all the area of Business, Education, Social Impact and data miner. The growing …