2017
DOI: 10.1007/s10586-017-1178-8
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED ARTICLE: A novel scheme for safeguarding confidentiality in public clouds for service users of cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…When the sender receives this notification message, sender node stops packet transmission for a certain period of time. For the successful packet transmission performed based on link quality 25 . In the case of no failurenotification or no ACK is received by the sender node at the link quality is reduced to a low level, so only delaycontrolling used in our method to transmit the delay packet to be added to network.…”
Section: Introductionmentioning
confidence: 99%
“…When the sender receives this notification message, sender node stops packet transmission for a certain period of time. For the successful packet transmission performed based on link quality 25 . In the case of no failurenotification or no ACK is received by the sender node at the link quality is reduced to a low level, so only delaycontrolling used in our method to transmit the delay packet to be added to network.…”
Section: Introductionmentioning
confidence: 99%
“…These investigations uses prevailing flow tools and approaches and analysis the outcomes via ML approach utilization. The author cannot use aggregated flow that effectually recognizes botnet threats for decision making process [30]. It cannot find effectual features of protocols as recommended in the anticipated model.…”
Section: Nids Approachesmentioning
confidence: 99%
“…Cloud computing generates a huge number of safety-related problems and disputes. These problems range from the necessary beliefs -from the provider of the cloud system on the cloud interface for exploiting the cloud service-based assaults on other systems [35,37]. The chief issue with the cloud computing model is that it holds safe outsourcing of susceptible as well as business significant information and processes.…”
Section: Development Of Confidentiality Schemementioning
confidence: 99%
“…The safety challenges of the cloud model emerge with a fresh collection of independent aspects which reveals a pathway for fresh safety-related aspects, methods, and frameworks. The intention is to design confidentiality and safety for the users of the cloud with minimal calculation and reduced time [30,34,35]. Based on the usage of a multicloud framework, two-layered encryption and decryption are designed which offer twofold safety for the information of cloud users.…”
Section: Novel Feature-based Encryptionmentioning
confidence: 99%