Security Techniques in Cloud Computing for Cloud Data StorageBedse, AkshayPadiya, PujaVidhate, AmarsinhGrenze International Journal of Engineering & Technology (GIJET)
Energy-efficient Nature-Inspired techniques in Cloud computing datacenters Cloud computing is a systematic delivery of computing resources as services to the consumers via the Internet. Infrastructure as a Service (IaaS) is the ca... Usman, Mohammed JodaIsmail, Abdul SamadAbdul-Salaam, GaddafiChizari...
Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services ... R Bhadauria,S Sanyal - 《International Journal of Computer Appl...
This helps protect against cyberattacks that use techniques such as credential stuffing, and exploits bad cyber hygiene, such as password reuse. 7. Limit IT admin access: You should commit to a least-privilege policy that will enforce least privilege on endpoints and limit IT admin access to ...
Since consumers have little control over the infrastructure so a process which requires very powerful security are not good for it .In this model no access restriction can be applied and no authorization and authentication techniques can be used. Generally, public cloud service providers like Amazon...
Moreover, they studied cryptographic algorithms mainly used in cloud computing: modern cryptography, searchable encryption, homomorphic encryption, and attribute-based encryption (e.g. DES, 3DES, AES, RC6, and BLOWFISH), as a fusion of two or more cryptographic techniques, they have also created ...
The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing. In this process of identification, the author also found mitigation techniques to avert these security issues. A security guide is formulated which enables...
Intrusion detection techniques in cloud environment: A survey Security is of paramount importance in this new era of on-demand Cloud Computing. Researchers have provided a survey on several intrusion detection techniq... P Mishra,ES Pilli,V Varadharajan,... - 《Journal of Network & Computer Ap...
Journal of Cloud Computing All Volumes & Issues Open Access Recent Advancements in Cloud Security using Performance Technologies and TechniquesISSN: 2192-113X (Online) In this topical collection (27 articles) Page of 2 Research Design of Intrusion Detection System based on Cyborg intelligence ...
The popularity and advances in technology, recently have created a great deal of interest in cloud computing, especially for enterprises. Although the cloud computing platform offers a cost-efficient solution, there is a big drawback when it comes to sec