Results 21 to 30 of about 28,164 (210)

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

open access: yesIEEE Access, 2021
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi   +5 more
doaj   +1 more source

Enhanced Blockchain-based Key Generation using Butterfly Optimization Algorithm for Efficient Data Sharing in Cloud Computing [PDF]

open access: yesJournal of Information Technology Management, 2023
Cloud Computing, employed in various applications and services, refers to using computational resources as a service depending on customer needs via the Internet. The computing paradigm is built on data outsourcing to third-party-controlled data centers.
P. Anbumani, R. Dhanapal
doaj   +1 more source

A framework and tool to manage Cloud Computing service quality [PDF]

open access: yes, 2015
Cloud Computing has generated considerable interest in both companies specialized in Information and Communication Technology and business context in general.
Domínguez Mayo, Francisco José   +5 more
core   +1 more source

Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing [PDF]

open access: yesJisuanji gongcheng, 2020
Fog computing extends the computing power and data analysis applications of cloud computing to the edge of the network,meeting the requirements of low latency and mobility of the Internet of Things(IoT) devices,but at the same time generating new data ...
HUANG Fengming, TU Shanshan, MENG Yuan
doaj   +1 more source

Efficient and Secure Outsourcing of DFT, IDFT, and Circular Convolution

open access: yesIEEE Access, 2019
Discrete Fourier transform (DFT), inverse DFT (IDFT), and circular convolution are important tools for analyzing and designing discrete signals and systems, and are widely used in various industries.
Xiangli Xiao   +3 more
doaj   +1 more source

Secure data outsourcing in presence of the inference problem: issues and directions

open access: yesJournal of Information and Telecommunication, 2021
With the emergence of cloud computing paradigms, secure data outsourcing has become one of the crucial challenges which strongly imposes itself. Data owners place their data among cloud service providers in order to increase flexibility, optimize storage,
Adel Jebali   +2 more
doaj   +1 more source

Towards Transparent and Trustworthy Cloud [PDF]

open access: yes, 2017
Despite its immense benefits in terms of flexibility, resource consumption, and simplified management, cloud computing raises several concerns due to lack of trust and transparency.
Anisetti, M.   +4 more
core   +1 more source

Outsourcing Large-Scale Quadratic Programming to a Public Cloud

open access: yesIEEE Access, 2015
Cloud computing provides service for resource-constrained customers to perform large-scale scientific computation. However, it also brings some new challenges, which have to be considered in designing outsourcing protocols.
Lifeng Zhou, Chunguang Li
doaj   +1 more source

SLA-aware resource scheduling algorithm for cloud storage

open access: yesEURASIP Journal on Wireless Communications and Networking, 2020
Cloud computing is a novel computing paradigm, which connects plenty of computing resources and storage resources via Internet. Cloud computing provides a number of high-quality services, such as cloud storage, outsourcing computing, and on-demand self ...
Yong Wang   +4 more
doaj   +1 more source

Technology transfer of dynamic IT outsourcing requires security measures in SLAs [PDF]

open access: yes, 2010
For the present efforts in dynamic IT outsourcing environments like Grid or Cloud computing security and trust are ongoing issues. SLAs are a proved remedy to build up trust in outsourcing relations.
Brodhun, M. (Maximilian)   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy