Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (220)
  • Open Access

    ARTICLE

    Detecting and Preventing of Attacks in Cloud Computing Using Hybrid Algorithm

    R. S. Aashmi1, T. Jaya2,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 79-95, 2023, DOI:10.32604/iasc.2023.024291

    Abstract

    Cloud computing is the technology that is currently used to provide users with infrastructure, platform, and software services effectively. Under this system, Platform as a Service (PaaS) offers a medium headed for a web development platform that uniformly distributes the requests and resources. Hackers using Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks abruptly interrupt these requests. Even though several existing methods like signature-based, statistical anomaly-based, and stateful protocol analysis are available, they are not sufficient enough to get rid of Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks and hence there is a… More >

  • Open Access

    ARTICLE

    Hybrid Smart Contracts for Securing IoMT Data

    D. Palanikkumar1, Adel Fahad Alrasheedi2, P. Parthasarathi3, S. S. Askar2, Mohamed Abouhawwash4,5,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 457-469, 2023, DOI:10.32604/csse.2023.024884

    Abstract Data management becomes essential component of patient healthcare. Internet of Medical Things (IoMT) performs a wireless communication between E-medical applications and human being. Instead of consulting a doctor in the hospital, patients get health related information remotely from the physician. The main issues in the E-Medical application are lack of safety, security and privacy preservation of patient’s health care data. To overcome these issues, this work proposes block chain based IoMT Processed with Hybrid consensus protocol for secured storage. Patients health data is collected from physician, smart devices etc. The main goal is to store this highly valuable health related… More >

  • Open Access

    ARTICLE

    An Advanced Dynamic Scheduling for Achieving Optimal Resource Allocation

    R. Prabhu1,*, S. Rajesh2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 281-295, 2023, DOI:10.32604/csse.2023.024339

    Abstract Cloud computing distributes task-parallel among the various resources. Applications with self-service supported and on-demand service have rapid growth. For these applications, cloud computing allocates the resources dynamically via the internet according to user requirements. Proper resource allocation is vital for fulfilling user requirements. In contrast, improper resource allocations result to load imbalance, which leads to severe service issues. The cloud resources implement internet-connected devices using the protocols for storing, communicating, and computations. The extensive needs and lack of optimal resource allocating scheme make cloud computing more complex. This paper proposes an NMDS (Network Manager based Dynamic Scheduling) for achieving a… More >

  • Open Access

    ARTICLE

    Data De-Duplication Process and Authentication Using ERCE with Poisson Filter in Cloud Data Storage

    B. Venkatesan1,*, S. Chitra2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1603-1615, 2022, DOI:10.32604/iasc.2022.026049

    Abstract The cloud storage is essential environment for users to access high confidential data. Every single data is most valued by users. If we count, day by day information as well as, memory storage are increasing gradually. Cost of memory will increase when data increases with demand for storage. At present data duplication or redundant data storing in the cloud became hard for storage provider. Also, it makes security issue if repeated data from various users stored in the server. It makes data duplication, which is very efficient for intruders. Also, when same data stored in cloud, there will be a… More >

  • Open Access

    ARTICLE

    P-ACOHONEYBEE: A Novel Load Balancer for Cloud Computing Using Mathematical Approach

    Sunday Adeola Ajagbe1, Mayowa O. Oyediran2, Anand Nayyar3,*, Jinmisayo A. Awokola4, Jehad F. Al-Amri5

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1943-1959, 2022, DOI:10.32604/cmc.2022.028331

    Abstract Cloud computing is a collection of disparate resources or services, a web of massive infrastructures, which is aimed at achieving maximum utilization with higher availability at a minimized cost. One of the most attractive applications for cloud computing is the concept of distributed information processing. Security, privacy, energy saving, reliability and load balancing are the major challenges facing cloud computing and most information technology innovations. Load balancing is the process of redistributing workload among all nodes in a network; to improve resource utilization and job response time, while avoiding overloading some nodes when other nodes are underloaded or idle is… More >

  • Open Access

    ARTICLE

    A Neuro-Fuzzy Approach to Road Traffic Congestion Prediction

    Mohammed Gollapalli1, Atta-ur-Rahman2,*, Dhiaa Musleh2, Nehad Ibrahim2, Muhammad Adnan Khan3, Sagheer Abbas4, Ayesha Atta5, Muhammad Aftab Khan6, Mehwash Farooqui6, Tahir Iqbal7, Mohammed Salih Ahmed6, Mohammed Imran B. Ahmed6, Dakheel Almoqbil8, Majd Nabeel2, Abdullah Omer2

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 295-310, 2022, DOI:10.32604/cmc.2022.027925

    Abstract The fast-paced growth of artificial intelligence applications provides unparalleled opportunities to improve the efficiency of various systems. Such as the transportation sector faces many obstacles following the implementation and integration of different vehicular and environmental aspects worldwide. Traffic congestion is among the major issues in this regard which demands serious attention due to the rapid growth in the number of vehicles on the road. To address this overwhelming problem, in this article, a cloud-based intelligent road traffic congestion prediction model is proposed that is empowered with a hybrid Neuro-Fuzzy approach. The aim of the study is to reduce the delay… More >

  • Open Access

    ARTICLE

    Resource Load Prediction of Internet of Vehicles Mobile Cloud Computing

    Wenbin Bi1, Fang Yu2, Ning Cao3,*, Russell Higgs4

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 165-180, 2022, DOI:10.32604/cmc.2022.027776

    Abstract Load-time series data in mobile cloud computing of Internet of Vehicles (IoV) usually have linear and nonlinear composite characteristics. In order to accurately describe the dynamic change trend of such loads, this study designs a load prediction method by using the resource scheduling model for mobile cloud computing of IoV. Firstly, a chaotic analysis algorithm is implemented to process the load-time series, while some learning samples of load prediction are constructed. Secondly, a support vector machine (SVM) is used to establish a load prediction model, and an improved artificial bee colony (IABC) function is designed to enhance the learning ability… More >

  • Open Access

    ARTICLE

    Metaheuristics with Machine Learning Enabled Information Security on Cloud Environment

    Haya Mesfer Alshahrani1, Faisal S. Alsubaei2, Taiseer Abdalla Elfadil Eisa3, Mohamed K. Nour4, Manar Ahmed Hamza5,*, Abdelwahed Motwakel5, Abu Sarwar Zamani5, Ishfaq Yaseen5

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1557-1570, 2022, DOI:10.32604/cmc.2022.027135

    Abstract The increasing quantity of sensitive and personal data being gathered by data controllers has raised the security needs in the cloud environment. Cloud computing (CC) is used for storing as well as processing data. Therefore, security becomes important as the CC handles massive quantity of outsourced, and unprotected sensitive data for public access. This study introduces a novel chaotic chimp optimization with machine learning enabled information security (CCOML-IS) technique on cloud environment. The proposed CCOML-IS technique aims to accomplish maximum security in the CC environment by the identification of intrusions or anomalies in the network. The proposed CCOML-IS technique primarily… More >

  • Open Access

    ARTICLE

    Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing

    Amjad Alsirhani, Mohamed Ezz, Ayman Mohamed Mostafa*

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 967-984, 2022, DOI:10.32604/csse.2022.024854

    Abstract Identity management is based on the creation and management of user identities for granting access to the cloud resources based on the user attributes. The cloud identity and access management (IAM) grants the authorization to the end-users to perform different actions on the specified cloud resources. The authorizations in the IAM are grouped into roles instead of granting them directly to the end-users. Due to the multiplicity of cloud locations where data resides and due to the lack of a centralized user authority for granting or denying cloud user requests, there must be several security strategies and models to overcome… More >

  • Open Access

    ARTICLE

    Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption

    S. Saravanakumar1,*, S. Chitra2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 985-996, 2022, DOI:10.32604/csse.2022.019508

    Abstract Cloud storage is a service involving cloud service providers providing storage space to customers. Cloud storage services have numerous advantages, including convenience, high computation, and capacity, thereby attracting users to outsource data in the cloud. However, users outsource data directly via cloud stage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographic solution in a cloud environment, and can be drawn up for access control by data owners (DO) to define access policy. Unfortunately, an outsourced architecture applied with attribute-based encryption introduces numerous challenges, including revocation. This issue is… More >

Displaying 81-90 on page 9 of 220. Per Page