2022
DOI: 10.1155/2022/1907511
|View full text |Cite
|
Sign up to set email alerts
|

Security Protection Mechanism in Cloud Computing Authorization Model Using Machine Learning Techniques

Abstract: Because of the vast number of applications and the ambiguity in application methods, handwritten character recognition has garnered widespread recognition and increased prominence in the community of pattern recognition researchers ever since it was first developed. This is due to the fact that application methods can be quite ambiguous. Computer in the cloud, on the other hand, allows for suitable network access on demand to a shared pool of customizable computing resources and digital devices. According to t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 40 publications
0
2
0
Order By: Relevance
“…This indexing scheme helps track split chunks and their related information, providing a systematic method for managing the large amount of data generated during the image splitting process. It also aids subsequent steps in our method, such as encrypting feature-rich split chunks and inputting these split chunks into our improved ciphertext convolutional neural network classification model [30,31].…”
Section: Image Splittingmentioning
confidence: 99%
“…This indexing scheme helps track split chunks and their related information, providing a systematic method for managing the large amount of data generated during the image splitting process. It also aids subsequent steps in our method, such as encrypting feature-rich split chunks and inputting these split chunks into our improved ciphertext convolutional neural network classification model [30,31].…”
Section: Image Splittingmentioning
confidence: 99%
“…This indexing scheme helps track split chunks and their related information, providing a systematic method for managing the large amount of data generated during the image splitting process. It also aids subsequent steps in our method, such as encrypting feature-rich split chunks and inputting these split chunks into our improved ciphertext convolutional neural network classification model [39,40].…”
Section: Image Splittingmentioning
confidence: 99%
“…For instance, the Google App Engine is a cloud computing service that serves as a platform for hosting web applications. Examples of software as a service are Google app and Microsoft office online which offer both infrastructure and platform as a service for servers [4]. Cloud services are mainly categorized into Infrastructure as a Service (IaaS), Platform-based services (PaaS), and Software-based Services (SaaS).…”
Section: Introductionmentioning
confidence: 99%