Results 101 to 110 of about 2,486,163 (328)
Efficient Dynamic Bloom Filter Hashing Fragmentation for Cloud Data Storage
Security is important in cloud data storage while using the cloud services provided by the service provider in the cloud. Most of the research works have been designed for a secure cloud data storage.
Jegadeeswari S.+2 more
doaj +1 more source
Multilevel classification of security concerns in cloud computing
Threats jeopardize some basic security requirements in a cloud. These threats generally constitute privacy breach, data leakage and unauthorized data access at different cloud layers.
Syed Asad Hussain+4 more
doaj +1 more source
Is Cloud Computing Steganography-proof? [PDF]
The paper focuses on characterisation of information hiding possibilities in Cloud Computing. After general introduction to cloud computing and its security we move to brief description of steganography. In particular we introduce classification of steganographic communication scenarios in cloud computing which is based on location of the steganograms ...
arxiv
Ensuring data storage security in Cloud Computing [PDF]
Cong Wang+3 more
openalex +1 more source
This paper describes the basis for AInsectID Version 1, a GUI‐operable open‐source insect species identification, color processing, and image analysis software. This paper discusses our methods of algorithmic development, coupled to rigorous machine training used to enable high levels of validation accuracy.
Haleema Sadia, Parvez Alam
wiley +1 more source
The influence of cloud computing on the information security of information resources during their transfer or deployment on cloud platforms is considered. The relevance of the problem of protecting information resources on cloud platforms, including for
V. P. Kochyn, A. V. Shantsou
doaj +2 more sources
A Security Perspective on Adoption and Migration to Mobile Cloud Technology
Security is one of the main concerns of those who want to adopt and migrate to cloud computing technology. Security issues raised by cloud technology reveals that mobile cloud computing is raising the privacy and security issues such as identification ...
Mohammad Bin Ghudayyer+2 more
doaj +1 more source
Data Migration among Different Clouds [PDF]
Cloud computing services are becoming more and more popular. However, the high concentration of data and services on the clouds make them attractive targets for various security attacks, including DoS, data theft, and privacy attacks. Additionally, cloud providers may fail to comply with service level agreement in terms of performance, availability ...
arxiv
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing [PDF]
Qian Wang+4 more
openalex +1 more source
The article introduces WACEfNet, a new convolutional neural network architecture optimized for efficient aerial image analysis under resource constraints. It creatively integrates attention mechanisms and atrous convolutions into a compact widened residual network framework.
Md Meftahul Ferdaus+4 more
wiley +1 more source