Results 81 to 90 of about 751,340 (235)

An Automated Security Analysis Framework and Implementation for Cloud [PDF]

open access: yesarXiv, 2019
Cloud service providers offer their customers with on-demand and cost-effective services, scalable computing, and network infrastructures. Enterprises migrate their services to the cloud to utilize the benefit of cloud computing such as eliminating the capital expense of their computing need. There are security vulnerabilities and threats in the cloud.
arxiv  

Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine

open access: yesDigital Communications and Networks, 2023
With the rapid development of the Internet of Things (IoT), there are several challenges pertaining to security in IoT applications. Compared with the characteristics of the traditional Internet, the IoT has many problems, such as large assets, complex ...
Haifeng Lin   +3 more
doaj  

Context Analysis of Cloud Computing Systems Using a Pattern-Based Approach

open access: yesFuture Internet, 2018
Cloud computing services bring new capabilities for hosting and offering complex collaborative business operations. However, these advances might bring undesirable side-effects, e.g., introducing new vulnerabilities and threats caused by collaboration ...
Ludger Goeke   +2 more
doaj   +1 more source

A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing

open access: yesInternational Journal of Intelligent Networks, 2022
Cloud computing is a technology in which the resources are delivered as services. Users can access them anywhere, anytime via the Internet without any need to know the infrastructure knowledge, experience, or even authority that provides such services ...
Fursan Thabit   +4 more
doaj  

REVIEW ON FOG COMPUTING – APPLICATIONS, SECURITY, AND SOLUTIONS [PDF]

open access: yesProceedings on Engineering Sciences
A distributed computing model known as fog computing lies near the user for efficient data processing and analysis. Fog computing extends cloud computing and expands on the characteristics providing more features for the consumer's benefit.
Varun Varma Sangaraju   +4 more
doaj   +1 more source

Data Migration among Different Clouds [PDF]

open access: yesarXiv, 2015
Cloud computing services are becoming more and more popular. However, the high concentration of data and services on the clouds make them attractive targets for various security attacks, including DoS, data theft, and privacy attacks. Additionally, cloud providers may fail to comply with service level agreement in terms of performance, availability ...
arxiv  

SecLaaS: Secure Logging-as-a-Service for Cloud Forensics [PDF]

open access: yesarXiv, 2013
Cloud computing has emerged as a popular computing paradigm in recent years. However, today's cloud computing architectures often lack support for computer forensic investigations. Analyzing various logs (e.g., process logs, network logs) plays a vital role in computer forensics.
arxiv  

Assessing and Ranking Cloud Computing Security Risks Based On a Hybrid Approach Based On Pairwise Comparisons

open access: yesIranian Journal of Information Processing & Management, 2021
Today, despite many benefits of cloud computing technology, including cost savings, agility, increased flexibility and scalability the issue of information security is the main obstacle to the tendency of organizations towards cloud computing.
Mehdi Soltanifar, Seyed Mohammad Zargar
doaj  

Home - About - Disclaimer - Privacy