2019
DOI: 10.1007/978-3-030-32475-9_27
|View full text |Cite
|
Sign up to set email alerts
|

A Secured Private-Cloud Computing System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…In everyday life of peoples, IoT have played huge roles in workplaces, families, social facilities, enterprises and lifestyles. Consequently, they are capable of harvesting, storing and broadcasting enormous personal details about their owners; thereby throwing up security and privacy issues in cloud communication [1]. Wireless Ad-hoc networks continue to evolve serve moving objects especially with birth of IoT [6].…”
Section: Ubiquitous Data Protection Issuesmentioning
confidence: 99%
See 2 more Smart Citations
“…In everyday life of peoples, IoT have played huge roles in workplaces, families, social facilities, enterprises and lifestyles. Consequently, they are capable of harvesting, storing and broadcasting enormous personal details about their owners; thereby throwing up security and privacy issues in cloud communication [1]. Wireless Ad-hoc networks continue to evolve serve moving objects especially with birth of IoT [6].…”
Section: Ubiquitous Data Protection Issuesmentioning
confidence: 99%
“…Conversely, IoT devices have evolved into vast and multifaceted network owing to the huge quantity of data communicated across it. These growths could face enormous challenges and risks including management of huge data generations, energy inefficiencies, low processing capabilities, security threats, and large data encryption/decryption operations [1]. More problematic is the dealing with these issues in connected IoT settings for the smart devices.…”
Section: Ubiquitous Data Protection Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…Encryption of plain text into a cipher textis the key feature of cryptography. Integrity of data information has been driven by the crypto graphical interference in cloud computing [1]. Algorithms and massages digests have been driven by the crypto graphical engagement in the cloud computing of the globalised IT sector.…”
Section: Introductionmentioning
confidence: 99%