Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    Enhanced Coyote Optimization with Deep Learning Based Cloud-Intrusion Detection System

    Abdullah M. Basahel1, Mohammad Yamin1, Sulafah M. Basahel2, E. Laxmi Lydia3,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4319-4336, 2023, DOI:10.32604/cmc.2023.033497

    Abstract Cloud Computing (CC) is the preference of all information technology (IT) organizations as it offers pay-per-use based and flexible services to its users. But the privacy and security become the main hindrances in its achievement due to distributed and open architecture that is prone to intruders. Intrusion Detection System (IDS) refers to one of the commonly utilized system for detecting attacks on cloud. IDS proves to be an effective and promising technique, that identifies malicious activities and known threats by observing traffic data in computers, and warnings are given when such threats were identified. The current mainstream IDS are assisted… More >

  • Open Access

    ARTICLE

    An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms

    Muhammad Nadeem1, Ali Arshad2,*, Saman Riaz2, Syeda Wajiha Zahra1, Ashit Kumar Dutta3, Moteeb Al Moteri4, Sultan Almotairi5

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4059-4079, 2023, DOI:10.32604/cmc.2023.032882

    Abstract Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form. Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data. This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse. If this algorithm is applied to the cloud network, the attacker will not be able to access the data. To encrypt the data, the values of the bytes have been obtained by converting the plain text to ASCII. A key has been… More >

  • Open Access

    ARTICLE

    Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks

    Muhammad Nadeem1, Ali Arshad2, Saman Riaz2, Syeda Wajiha Zahra1, Shahab S. Band3, Amir Mosavi4,5,6,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2625-2640, 2023, DOI:10.32604/cmc.2023.030899

    Abstract Many organizations have insisted on protecting the cloud server from the outside, although the risks of attacking the cloud server are mostly from the inside. There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks. Still, the attackers have designed even better mechanisms to break these security algorithms. Cloud cryptography is the best data protection algorithm that exchanges data between authentic users. In this article, one symmetric cryptography algorithm will be designed to secure cloud server data, used to send and receive cloud server data securely. A double… More >

  • Open Access

    ARTICLE

    Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment

    S. Stewart Kirubakaran1,*, V. P. Arunachalam1, S. Karthik1, S. Kannan2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1881-1895, 2023, DOI:10.32604/csse.2023.026690

    Abstract In the present scenario of rapid growth in cloud computing models, several companies and users started to share their data on cloud servers. However, when the model is not completely trusted, the data owners face several security-related problems, such as user privacy breaches, data disclosure, data corruption, and so on, during the process of data outsourcing. For addressing and handling the security-related issues on Cloud, several models were proposed. With that concern, this paper develops a Privacy-Preserved Data Security Approach (PP-DSA) to provide the data security and data integrity for the outsourcing data in Cloud Environment. Privacy preservation is ensured… More >

  • Open Access

    ARTICLE

    Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption

    S. Saravanakumar1,*, S. Chitra2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 985-996, 2022, DOI:10.32604/csse.2022.019508

    Abstract Cloud storage is a service involving cloud service providers providing storage space to customers. Cloud storage services have numerous advantages, including convenience, high computation, and capacity, thereby attracting users to outsource data in the cloud. However, users outsource data directly via cloud stage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographic solution in a cloud environment, and can be drawn up for access control by data owners (DO) to define access policy. Unfortunately, an outsourced architecture applied with attribute-based encryption introduces numerous challenges, including revocation. This issue is… More >

  • Open Access

    ARTICLE

    A Proposed Biometric Authentication Model to Improve Cloud Systems Security

    Hosam El- El-Sofany1,2,*

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 573-589, 2022, DOI:10.32604/csse.2022.024302

    Abstract Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password. Unfortunately, this approach has many security problems because personal data can be stolen or recognized by hackers. This paper aims to present a cloud-based biometric authentication model (CBioAM) for improving and securing cloud services. The research study presents the verification and identification processes of the proposed cloud-based biometric authentication system (CBioAS), where the biometric samples of users are saved in database servers and the authentication process is implemented without loss of the users’ information. The paper… More >

  • Open Access

    ARTICLE

    Fuzzy Based Latent Dirichlet Allocation for Intrusion Detection in Cloud Using ML

    S. Ranjithkumar1,*, S. Chenthur Pandian2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4261-4277, 2022, DOI:10.32604/cmc.2022.019031

    Abstract The growth of cloud in modern technology is drastic by provisioning services to various industries where data security is considered to be common issue that influences the intrusion detection system (IDS). IDS are considered as an essential factor to fulfill security requirements. Recently, there are diverse Machine Learning (ML) approaches that are used for modeling effectual IDS. Most IDS are based on ML techniques and categorized as supervised and unsupervised. However, IDS with supervised learning is based on labeled data. This is considered as a common drawback and it fails to identify the attack patterns. Similarly, unsupervised learning fails to… More >

  • Open Access

    ARTICLE

    Cloud Security Service for Identifying Unauthorized User Behaviour

    D. Stalin David1, Mamoona Anam2, Chandraprabha Kaliappan3, S. Arun Mozhi Selvi4, Dilip Kumar Sharma5, Pankaj Dadheech6, Sudhakar Sengan7,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2581-2600, 2022, DOI:10.32604/cmc.2022.020213

    Abstract Recently, an innovative trend like cloud computing has progressed quickly in Information Technology. For a background of distributed networks, the extensive sprawl of internet resources on the Web and the increasing number of service providers helped cloud computing technologies grow into a substantial scaled Information Technology service model. The cloud computing environment extracts the execution details of services and systems from end-users and developers. Additionally, through the system’s virtualization accomplished using resource pooling, cloud computing resources become more accessible. The attempt to design and develop a solution that assures reliable and protected authentication and authorization service in such cloud environments… More >

  • Open Access

    ARTICLE

    QoS Based Cloud Security Evaluation Using Neuro Fuzzy Model

    Nadia Tabassum1, Tahir Alyas2, Muhammad Hamid3,*, Muhammad Saleem4, Saadia Malik5, Syeda Binish Zahra2

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1127-1140, 2022, DOI:10.32604/cmc.2022.019760

    Abstract Cloud systems are tools and software for cloud computing that are deployed on the Internet or a cloud computing network, and users can use them at any time. After assessing and choosing cloud providers, however, customers confront the variety and difficulty of quality of service (QoS). To increase customer retention and engagement success rates, it is critical to research and develops an accurate and objective evaluation model. Cloud is the emerging environment for distributed services at various layers. Due to the benefits of this environment, globally cloud is being taken as a standard environment for individuals as well as for… More >

  • Open Access

    ARTICLE

    Safeguarding Cloud Computing Infrastructure: A Security Analysis

    Mamdouh Alenezi*

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 159-167, 2021, DOI:10.32604/csse.2021.015282

    Abstract Cloud computing is the provision of hosted resources, comprising software, hardware and processing over the World Wide Web. The advantages of rapid deployment, versatility, low expenses and scalability have led to the widespread use of cloud computing across organizations of all sizes, mostly as a component of the combination/multi-cloud infrastructure structure. While cloud storage offers significant benefits as well as cost-effective alternatives for IT management and expansion, new opportunities and challenges in the context of security vulnerabilities are emerging in this domain. Cloud security, also recognized as cloud computing security, refers to a collection of policies, regulations, systematic processes that… More >

Displaying 1-10 on page 1 of 15. Per Page  

Share Link