Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (253)
  • Open Access

    ARTICLE

    Intelligent Digital Envelope for Distributed Cloud-Based Big Data Security

    S. Prince Chelladurai1,*, T. Rajagopalan2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 951-960, 2023, DOI:10.32604/csse.2023.034262 - 20 January 2023

    Abstract Cloud computing offers numerous web-based services. The adoption of many Cloud applications has been hindered by concerns about data security and privacy. Cloud service providers’ access to private information raises more security issues. In addition, Cloud computing is incompatible with several industries, including finance and government. Public-key cryptography is frequently cited as a significant advancement in cryptography. In contrast, the Digital Envelope that will be used combines symmetric and asymmetric methods to secure sensitive data. This study aims to design a Digital Envelope for distributed Cloud-based large data security using public-key cryptography. Through strategic design, More >

  • Open Access

    ARTICLE

    Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment

    P. Prathap Nayudu, Krovi Raja Sekhar*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1079-1092, 2023, DOI:10.32604/csse.2023.033961 - 20 January 2023

    Abstract The cloud allows clients to store and share data. Depending on the user’s needs, it is imperative to design an effective access control plan to share the information only with approved users. The user loses control of their data when the data is outsourced to the cloud. Therefore, access control mechanisms will become a significant challenging problem. The Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an essential solution in which the user can control data access. CP-ABE encrypts the data under a limited access policy after the user sets some access policies. The user can decrypt the… More >

  • Open Access

    ARTICLE

    Latency Minimization Using an Adaptive Load Balancing Technique in Microservices Applications

    G. Selvakumar1,*, L. S. Jayashree2, S. Arumugam3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1215-1231, 2023, DOI:10.32604/csse.2023.032509 - 20 January 2023

    Abstract Advancements in cloud computing and virtualization technologies have revolutionized Enterprise Application Development with innovative ways to design and develop complex systems. Microservices Architecture is one of the recent techniques in which Enterprise Systems can be developed as fine-grained smaller components and deployed independently. This methodology brings numerous benefits like scalability, resilience, flexibility in development, faster time to market, etc. and the advantages; Microservices bring some challenges too. Multiple microservices need to be invoked one by one as a chain. In most applications, more than one chain of microservices runs in parallel to complete a particular… More >

  • Open Access

    ARTICLE

    Hash-Indexing Block-Based Deduplication Algorithm for Reducing Storage in the Cloud

    D. Viji*, S. Revathy

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 27-42, 2023, DOI:10.32604/csse.2023.030259 - 20 January 2023

    Abstract Cloud storage is essential for managing user data to store and retrieve from the distributed data centre. The storage service is distributed as pay a service for accessing the size to collect the data. Due to the massive amount of data stored in the data centre containing similar information and file structures remaining in multi-copy, duplication leads to increase storage space. The potential deduplication system doesn’t make efficient data reduction because of inaccuracy in finding similar data analysis. It creates a complex nature to increase the storage consumption under cost. To resolve this problem, this… More >

  • Open Access

    ARTICLE

    A Broker-Based Task-Scheduling Mechanism Using Replication Approach for Cloud Systems

    Abdulelah Alwabel*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2217-2232, 2023, DOI:10.32604/iasc.2023.033703 - 05 January 2023

    Abstract The reliability and availability of cloud systems have become major concerns of service providers, brokers, and end-users. Therefore, studying fault-tolerance mechanisms in cloud computing attracts intense attention in industry and academia. The task-scheduling mechanisms can improve the fault-tolerance level of cloud systems. A task-scheduling mechanism distributes tasks to a group of instances to be executed. Much work has been undertaken in this direction to improve the overall outcome of cloud computing, such as improving service quality and reducing power consumption. However, little work on task scheduling has studied the problem of lost tasks from the… More >

  • Open Access

    ARTICLE

    Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment

    A. Ramachandran1,*, P. Ramadevi2, Ahmed Alkhayyat3, Yousif Kerrar Yousif4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2055-2070, 2023, DOI:10.32604/iasc.2023.032942 - 05 January 2023

    Abstract Nowadays, numerous applications are associated with cloud and user data gets collected globally and stored in cloud units. In addition to shared data storage, cloud computing technique offers multiple advantages for the user through different distribution designs like hybrid cloud, public cloud, community cloud and private cloud. Though cloud-based computing solutions are highly convenient to the users, it also brings a challenge i.e., security of the data shared. Hence, in current research paper, blockchain with data integrity authentication technique is developed for an efficient and secure operation with user authentication process. Blockchain technology is utilized… More >

  • Open Access

    ARTICLE

    Enhanced Rsa (Ersa): An Advanced Mechanism for Improving the Security

    S. Castro1,*, R. PushpaLakshmi2

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2267-2279, 2023, DOI:10.32604/iasc.2023.032222 - 05 January 2023

    Abstract Cloud computing has become ubiquitous in our daily lives in recent years. Data are the source of technology that is generated hugely by various sources. Big data is dealing with huge data volumes or complex data. The major concern in big data is security threats. Security concerns create a negative impact on the user on the aspect of trust. In big data still, security threats exist as commonly known as DDOS (Distributed-Denial-of-Service) attacks, data loss, Inadequate Data Backups, System Vulnerabilities, and Phishing as well as Social Engineering Attacks. In our work, we have taken the… More >

  • Open Access

    ARTICLE

    Trust and QoS-Driven Query Service Provisioning Using Optimization

    K. Narmatha1,*, K. Karthikeyan2

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1827-1844, 2023, DOI:10.32604/iasc.2023.028473 - 05 January 2023

    Abstract The growing advancements with the Internet of Things (IoT) devices handle an enormous amount of data collected from various applications like healthcare, vehicle-based communication, and smart city. This research analyses cloud-based privacy preservation over the smart city based on query computation. However, there is a lack of resources to handle the incoming data and maintain them with higher privacy and security. Therefore, a solution based idea needs to be proposed to preserve the IoT data to set an innovative city environment. A querying service model is proposed to handle the incoming data collected from various… More >

  • Open Access

    ARTICLE

    Performance Framework for Virtual Machine Migration in Cloud Computing

    Tahir Alyas1, Taher M. Ghazal2,3, Badria Sulaiman Alfurhood4, Munir Ahmad5, Ossma Ali Thawabeh6, Khalid Alissa7, Qaiser Abbas8,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6289-6305, 2023, DOI:10.32604/cmc.2023.035161 - 28 December 2022

    Abstract In the cloud environment, the transfer of data from one cloud server to another cloud server is called migration. Data can be delivered in various ways, from one data centre to another. This research aims to increase the migration performance of the virtual machine (VM) in the cloud environment. VMs allow cloud customers to store essential data and resources. However, server usage has grown dramatically due to the virtualization of computer systems, resulting in higher data centre power consumption, storage needs, and operating expenses. Multiple VMs on one data centre manage share resources like central… More >

  • Open Access

    ARTICLE

    Chaotic Metaheuristics with Multi-Spiking Neural Network Based Cloud Intrusion Detection

    Mohammad Yamin1,*, Saleh Bajaba2, Zenah Mahmoud AlKubaisy1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6101-6118, 2023, DOI:10.32604/cmc.2023.033677 - 28 December 2022

    Abstract Cloud Computing (CC) provides data storage options as well as computing services to its users through the Internet. On the other hand, cloud users are concerned about security and privacy issues due to the increased number of cyberattacks. Data protection has become an important issue since the users’ information gets exposed to third parties. Computer networks are exposed to different types of attacks which have extensively grown in addition to the novel intrusion methods and hacking tools. Intrusion Detection Systems (IDSs) can be used in a network to manage suspicious activities. These IDSs monitor the… More >

Displaying 71-80 on page 8 of 253. Per Page