Results 1 to 10 of about 487,101 (267)

Cloud Computing Security: A Survey [PDF]

open access: yesComputers, 2014
Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing
Issa M. Khalil   +2 more
doaj   +4 more sources

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

open access: yesIEEE Access, 2021
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi   +5 more
doaj   +2 more sources

CLOUD COMPUTING SECURITY [PDF]

open access: yesFiabilitate şi Durabilitate, 2016
Cloud computing reprentes the software applications offered as a service online, but also the software and hardware components from the data center.In the case of wide offerd services for any type of client, we are dealing with a public cloud.
Ştefan IOVAN, Alina Anabela IOVAN
doaj   +3 more sources

Security and Privacy in Cloud Computing: Technical Review

open access: yesFuture Internet, 2021
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of ...
Yunusa Simpa Abdulsalam   +1 more
doaj   +2 more sources

Security of Cloud Computing

open access: yesDianxin kexue, 2013
Cloud security has been widely considered as the key factor restricting its development since the cloud computing technology emerged.The insecure factors of cloud computing system and the secure factors which cloud computing brings were presented and ...
Qunying Sun, Zhiyuan Hu
doaj   +3 more sources

Survey on security issues in file management in cloud computing environment

open access: green, 2015
Cloud computing has pervaded through every aspect of Information technology in past decade. It has become easier to process plethora of data, generated by various devices in real time, with the advent of cloud networks.
Gupta, Udit
core   +3 more sources

Blockchain Secured Dynamic Machine Learning Pipeline for Manufacturing

open access: yesApplied Sciences, 2023
ML-based applications already play an important role in factories in areas such as visual quality inspection, process optimization, and maintenance prediction and will become even more important in the future.
Fatemeh Stodt   +2 more
doaj   +1 more source

Introducing a Fair Tax Method to Harden Industrial Blockchain Applications against Network Attacks: A Game Theory Approach

open access: yesComputers, 2023
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare.
Fatemeh Stodt, Christoph Reich
doaj   +1 more source

A Hybrid Encryption Solution to Improve Cloud Computing Security using Symmetric and Asymmetric Cryptography Algorithms

open access: yesInternational Journal of Advanced Computer Science and Applications, 2021
—Ensuring the security of cloud computing is one of the most critical challenges facing the cloud services sector. Dealing with data in a cloud environment, which uses shared resources, and providing reliable and secure cloud services, requires a robust ...
Hossein Abroshan
semanticscholar   +1 more source

Cloud Computing and Security Issues in the Cloud [PDF]

open access: yesInternational Journal of Network Security & Its Applications, 2014
Cloud computing has formed the conceptual and infrastructural basis for tomorrow s computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could based computing by means of deploying it in diversified sectors, the security aspects in a cloud based computing ...
Monjur Ahmed, Mohammad Ashraf Hossain
openaire   +2 more sources

Home - About - Disclaimer - Privacy