2020
DOI: 10.3390/s20123458
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Data Management and Security in Cloud Computing

Abstract: This paper will present the authors’ own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated to the tasks of secret (confidential) data sharing. Such solutions will be presented in an algorithmic form, aimed at solving the tasks of protecting and securing data against unauthorized acquisition. Data-sharing protocols will execute the tasks of securing a speci… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
33
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 46 publications
(33 citation statements)
references
References 26 publications
(38 reference statements)
0
33
0
Order By: Relevance
“…The division of themes must ensure the independence of each theme. Data warehouse integration is the process of extracting, filtering, cleaning, and merging distributed data to meet the needs of decision analysis, to integrate the data in the database [ 11 ].…”
Section: Data Mining Technology and Economic Intelligence Systemsmentioning
confidence: 99%
“…The division of themes must ensure the independence of each theme. Data warehouse integration is the process of extracting, filtering, cleaning, and merging distributed data to meet the needs of decision analysis, to integrate the data in the database [ 11 ].…”
Section: Data Mining Technology and Economic Intelligence Systemsmentioning
confidence: 99%
“…It is difficult for students to acquire and apply science, and the outcome is not clear. It is a quick and important task to find the best psychology for students to manage, to guide them to analyze themselves [ 19 ], to understand each other more accurately, to develop themselves, to promote the health of their character [ 20 , 21 ], to maintain mental health, and to promote good behavior. Mental health education for international college students begins early.…”
Section: Introductionmentioning
confidence: 99%
“…It is economically feasible to store, process, and update the electronic data of patients in cloud computing [26]. Graph models [27] were developed and tested to provide security in cloud computing. Cryptographic threshold techniques were applied, along with intelligent secret management and data sharing techniques.…”
Section: Related Workmentioning
confidence: 99%