Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN

    Muhammad Nadeem1, Ali Arshad2, Saman Riaz2, SyedaWajiha Zahra1, Muhammad Rashid2, Shahab S. Band3,*, Amir Mosavi4,5,6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2641-2659, 2023, DOI:10.32604/cmc.2023.028796

    Abstract Cloud computing is one of the most attractive and cost-saving models, which provides online services to end-users. Cloud computing allows the user to access data directly from any node. But nowadays, cloud security is one of the biggest issues that arise. Different types of malware are wreaking havoc on the clouds. Attacks on the cloud server are happening from both internal and external sides. This paper has developed a tool to prevent the cloud server from spamming attacks. When an attacker attempts to use different spamming techniques on a cloud server, the attacker will be intercepted through two effective techniques:… More >

  • Open Access

    ARTICLE

    A New Reliable System For Managing Virtual Cloud Network

    Samah Alshathri1,*, Fatma M. Talaat2, Aida A. Nasr3

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5863-5885, 2022, DOI:10.32604/cmc.2022.026547

    Abstract Virtual cloud network (VCN) usage is popular today among large and small organizations due to its safety and money-saving. Moreover, it makes all resources in the company work as one unit. VCN also facilitates sharing of files and applications without effort. However, cloud providers face many issues in managing the VCN on cloud computing including these issues: Power consumption, network failures, and data availability. These issues often occur due to overloaded and unbalanced load tasks. In this paper, we propose a new automatic system to manage VCN for executing the workflow. The new system called Multi-User Hybrid Scheduling (MUSH) can… More >

  • Open Access

    ARTICLE

    Binary Multifold Encryption Technique for Complex Cloud Systems

    N. Ansgar Mary1,*, T. Latha2

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1199-1213, 2022, DOI:10.32604/csse.2022.022404

    Abstract Data security is a major cloud computing issue due to different user transactions in the system. The evolution of cryptography and cryptographic analysis are regarded domains of current research. deoxyribo nucleic acid (DNA) cryptography makes use of DNA as a sensing platform, which is then manipulated using a variety of molecular methods. Many security mechanisms including knowledge-based authentication, two-factor authentication, adaptive authentication, multifactor authentication and single password authentication have been deployed. These cryptographic techniques have been developed to ensure confidentiality, but most of them are based on complex mathematical calculations and equations. In the proposed approach, a novel and unique… More >

  • Open Access

    ARTICLE

    Protecting Data Mobility in Cloud Networks Using Metadata Security

    R. Punithavathi1,*, M. Kowsigan2, R. Shanthakumari3, Miodrag Zivkovic4, Nebojsa Bacanin4, Marko Sarac4

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 105-120, 2022, DOI:10.32604/csse.2022.020486

    Abstract At present, health care applications, government services, and banking applications use big data with cloud storage to process and implement data. Data mobility in cloud environments uses protection protocols and algorithms to secure sensitive user data. Sometimes, data may have highly sensitive information, leading users to consider using big data and cloud processing regardless of whether they are secured are not. Threats to sensitive data in cloud systems produce high risks, and existing security methods do not provide enough security to sensitive user data in cloud and big data environments. At present, several security solutions support cloud systems. Some of… More >

Displaying 1-10 on page 1 of 4. Per Page