Have a personal or library account? Click to login
Efficient way to ensure the data security in cloud computing Cover

References

  1. Abdullayeva, F. J. 2021. Advanced Persistent Threat attack detection method in cloud computing based on autoencoder and softmax regression algorithm. Array 10: 100067.
  2. Aissaoui, K., Amane, M., Berrada, M. and Madani, M. A. 2022. A new framework to secure cloud based e-learning systems. In Bennani, S., Lakhrissi, Y., Khaissidi, G., Mansouri, A. and Khamlichi, Y. (Eds), WITS 2020. Springer, Singapore, pp. 65–75.
  3. Alashhab, Z. R., Anbar, M., Singh, M. M., Leau, Y. B., Al-Sai, Z. A. and Alhayja’a, S. A. 2021. Impact of coronavirus pandemic crisis on technologies and cloud computing applications. Journal of Electronic Science and Technology 19(1): 100059.
  4. Babu, M. C. and Senthilkumar, K. 2021. Machine learning based strategies for secure cloud. Materials Today: Proceedings.
  5. Bello, S. A., Oyedele, L. O., Akinade, O. O., Bilal, M., Delgado, J. M. D., Akanbi, L. A., Ajayi, A. O. and Owolabi, H. A. 2021. Cloud computing in construction industry: Use cases, benefits and challenges. Automation in Construction 122: 103441.
  6. Chinnasamy, P., Padmavathi, S., Swathy, R. and Rakesh, S. 2021. Efficient data security using hybrid cryptography on cloud computing. In Ranganathan, G., Chen, J. and Rocha, Á. (Eds), Inventive Communication and Computational Technologies. Springer, Singapore, pp. 537–547.
  7. Hu, Q., Wu, F., Wong, R. K., Millham, R. C. and Fiaidhi, J. 2021. A novel indoor localization system using machine learning based on bluetooth low energy with cloud computing. Computing 2021: 1–27.
  8. Jayashri, N. and Kalaiselvi, K. 2021. Collaborative approaches for security of cloud and knowledge management systems: benefits and risks. In Bhardwaj, A. and Sapra, V. (Eds), Security Incidents & Response Against Cyber Attacks. Springer, Cham, pp. 57–64.
  9. Koushik, S. and Patil, A. P. 2022. Exploring live cloud migration on Amazon S3 instance using inter cloud framework. In Gandhi, T. K., Konar, D., Sen, B. and Sharma, K. (Eds), Advanced Computational Paradigms and Hybrid Intelligent Computing. Springer, Singapore, pp. 221–229.
  10. Kumar, L. and Kumar, P. 2021. Amazon EC2:(Elastic Compute Cloud) overview. In Singh Mer, K. K., Semwal, V. B., Bijalwan, V. and Crespo, R. G. (Eds), Proceedings of Integrated Intelligence Enable Networks and Computing. Springer, Singapore, pp. 543–552.
  11. Mishra, P., Aggarwal, P., Vidyarthi, A., Singh, P., Khan, B., Alhelou, H. H. and Siano, P. 2021. VM Shield: Memory Introspection-based Malware Detection to Secure Cloud-based Services against Stealthy Attacks. IEEE Transactions on Industrial Informatics 17(10): 6754–6764.
  12. Mythili, S., Thiyagarajah, K., Rajesh, P. and Shajin, F. H. 2020. Ideal position and size selection of unified power flow controllers (UPFCs) to upgrade the dynamic stability of systems: an antlion optimiser and invasive weed optimisation algorithm. HKIE Trans 27(1): 25–37.
  13. Ogwel, B., Odhiambo-Otieno, G., Otieno, G., Abila, J. and Omore, R. 2021. Leveraging cloud computing for improved health service delivery: Findings from public health facilities in Kisumu County, Western Kenya-2019 Western Kenya: Learning Health Systems, pp. e10276.
  14. Rajesh, P. and Shajin, F. A. 2020. Multi-objective hybrid algorithm for planning electrical distribution system. European Journal of Electrical Engineering 22: 224–509.
  15. Shaikh, A. H. and Meshram, B. B. 2021. Security issues in cloud computing. In Balas, V. E., Semwal, V. B., Khandare, A. and Patil, M. (Eds), Intelligent Computing and Networking. Springer, Singapore, pp. 63–77.
  16. Shajin, F. H. and Rajesh, P. 2020. Trusted secure geographic routing protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol. International Journal of Pervasive Computing and Communications 1(1): 1.
  17. Su, Y., Li, Y., Yang, B. and Ding, Y. 2021. Decentralized self-auditing scheme with errors localization for multi-cloud storage. IEEE Transactions on Dependable and Secure Computing 1(1): 1.
  18. Thota, M. K., Shajin, F. H. and Rajesh, P. 2020. Survey on software defect prediction techniques. International Journal of Applied Science and Engineering. 17(4): 331–344.
  19. Velliangiri, S., Karthikeyan, P. and Vinoth Kumar, V. 2021. Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks. Journal of Experimental & Theoretical Artificial Intelligence 33(3): 405–424.
Language: English
Submitted on: Sep 14, 2021
Published on: Jun 29, 2022
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2022 Anil Kumar Pallikonda, Kavitha Chaduvula, Baburao Markapudi, Ch Rathna Jyothi, D N V S L S Indira, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.