A systematic review on game-theoretic models and different types of security requirements in cloud environment: challenges and opportunities

KS Gill, A Sharma, S Saxena - Archives of Computational Methods in …, 2024 - Springer
The presented survey paper explores the application of game theoretic models for
addressing security challenges in cloud computing environments. It highlights the …

A security model to protect the isolation of medical data in the cloud using hybrid cryptography

S Gadde, J Amutharaj, S Usha - Journal of Information Security and …, 2023 - Elsevier
A cloud computing platform delivers a cost-efficient path for cloud users to store and access
data privately over remote storage via an Internet connection. Medical data is stored in the …

Knowledge and innovative factors: how cloud computing improves students' academic performance

SA Raza, KA Khan - Interactive Technology and Smart Education, 2022 - emerald.com
Purpose Collaboration, communication, critical thinking and creativity are the most essential
Cs of education. However, at present, these Cs are interlinked with technology to make it …

Understanding and predicting academic performance through cloud computing adoption: a perspective of technology acceptance model

Z Ali, B Gongbing, A Mehreen - Journal of Computers in Education, 2018 - Springer
Cloud computing is becoming an integral part of education community due to its strong
acceptance and innovative application for fulfilling their academics needs. In this paper, we …

Enhancing multi‐tenancy security in the cloud computing using hybrid ECC‐based data encryption approach

P Kumar, A Kumar Bhatt - IET Communications, 2020 - Wiley Online Library
In this study, elliptic curve cryptography (ECC) is elected for tenant authentication, data
encryption, and data decryption due to its minimum key size. The proposed ECC‐based …

[PDF][PDF] Proposing new intelligence algorithm for suggesting better services to cloud users based on Kalman Filtering

M Darbandi - Published by Journal of Computer Sciences and …, 2017 - academia.edu
Because of intrinsic characteristic of cloud computing, which made organizations and
companies free from buying hardware and software infrastructures, lots of companies and …

Efficient resource management system based on 4vs of big data streams

N Kaur, SK Sood - Big data research, 2017 - Elsevier
Big data streams are generated continuously at unprecedented speed by thousands of data
sources. The analysis of such streams need cloud resources. Due to growth of big data over …

QoS parameters for viable SLA in cloud

MR Raza, A Varol - … on Digital Forensics and Security (ISDFS), 2020 - ieeexplore.ieee.org
Quality of Service (QoS) is a key factor for a viable Service Level Agreement (SLA) which
ensures the formation of a reliable provider-consumer relationship in cloud computing. SLA …

Cloud computing adoption in higher education: an integrated theoretical model

MA Al-Sharafi, Q AlAjmi, M Al-Emran… - Recent Advances in …, 2021 - Springer
Several studies were carried out earlier to investigate the determinants affecting cloud
computing adoption at the individual level. However, the question of what impacts the cloud …

Enhancing modular application placement in a hierarchical fog computing: A latency and communication cost-sensitive approach

LT Oliveira, LF Bittencourt, TAL Genez… - Computer …, 2024 - Elsevier
Over the years, cloud computing has been a key enabler for handling complex applications
and services for Internet of Things (IoT) devices situated at the edge of the network. Services …