Search Results - (( based encryption cloud algorithm ) OR ( simulation optimization method algorithm ))
Search alternatives:
-
1
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…We suggested a chaotic map-based camellia encryption algorithm (CMCE) to boost security. …”
Get full text
Get full text
Get full text
Article -
2
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
3
-
4
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
Published 2016“…In this thesis, we have proposed a security solution based on an ECC algorithm to improve the security and the performance of the data by dividing the file content and encrypting it on both the server and the client side. …”
Get full text
Get full text
Thesis -
5
Towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption
Published 2021“…To address this issue, we proposed a reinforcement hiding in access policy over Cloud storage by enhancing the Ciphertext Policy Attribute-based Encryption (CP-ABE) algorithm. …”
Get full text
Get full text
Article -
6
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. …”
Get full text
Get full text
Get full text
Article -
7
Data classification based on confidentiality in virtual cloud environment
Published 2014“…In a cloud server, the data are stored in two ways. First encrypt the received data and store on cloud servers. …”
Get full text
Get full text
Article -
8
-
9
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…The pairing-based encryption known as "DNA sequence Enhanced Advanced Encryption Standard (EAES)" can be used to protect medical ECG signals that are stored in the cloud for healthcare purposes using the nebula network architecture. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Fine-grained access control using Attribute-Based Encryption (ABE) mechanisms can be enforced as the first line of defense on the untrusted cloud to forbid unauthorized access to the stored data. …”
Get full text
Get full text
Thesis -
13
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
-
15
-
16
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…One major such security laps is that referred to as the Man in the Middle (MITM) attack where external data are injected to either hijack a data in transit or to manipulate the files and object by posing as a floating cloud base. Fresh algorithms’ for cloud data protection do exist however, they are still prone to attack especially in real-time data transmissions due to employed mechanism. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Implementing server-side federated learning in an edge-cloud framework for precision aquaculture
Published 2025“…Reviews include systems using IoT and AI-based models, along with analysis of different federated learning algorithms such as FedSGD, FedAvg, and FedProx, and privacypreserving methods such as DA, SA, HE and CKKS encryption. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
K-NN classifier for data confidentiality in cloud computing
Published 2014“…In this paper, we propose a data classification approach based on data confidentiality. K-NN data classification technique is modulated in the cloud virtual environment. …”
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Secret sharing scheme for key management of secure data sharing in cloud
Published 2019“…One of the known issues in cloud storage is the high key generation time for large-scale users and limiting the use of cryptography for data encryption. …”
Get full text
Get full text
Thesis
