2023
DOI: 10.11591/eei.v12i1.4590
|View full text |Cite
|
Sign up to set email alerts
|

Data security in cloud environment using cryptographic mechanism

Abstract: Virtual computing resources are provided via a cloud system that is both clever and intelligent. Based on the user's request, computing resources are made available. A hybrid cloud is the best option for storing and accessing user data for cloud deployments. Maintaining security in a hybrid cloud environment is time-consuming. This study provides a novel strategy for securing data in the hybrid cloud by ensuring the user's data is protected. Users' data in a hybrid cloud is protected using cryptographic approa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 20 publications
(22 reference statements)
0
0
0
Order By: Relevance
“…We used property-based encryption to outline NHACSM. Java and NetBeans build up the latest cloud environment using the latest CloudSim connectors [18] and [19]. Each host has 2.4 Hz, 4-8 GB RAM, and 1 TB storage for this execution.…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…We used property-based encryption to outline NHACSM. Java and NetBeans build up the latest cloud environment using the latest CloudSim connectors [18] and [19]. Each host has 2.4 Hz, 4-8 GB RAM, and 1 TB storage for this execution.…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…Recently, many international companies have ranked security [45][46][47] as the most difficult parameter to achieve in the cloud and the first challenge for cloud developers and users. In the literature, several heuristics and meta-heuristics have been developed to optimize cost, processing time, and distribute workflows and tasks [48][49][50]. Heuristics and algorithms for planning workflow in a cloud environment, taking into account security parameters, are not extensively developed.…”
Section: Study Backgroundmentioning
confidence: 99%