Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    Light-Weighted Decision Support Framework for Selecting Cloud Service Providers

    Abdulmajeed Aljuhani1,*, Abdulaziz Alhubaishy2, Mohammad Khalid Imam Rahmani2, Ahmad A. Alzahrani3

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4293-4317, 2023, DOI:10.32604/cmc.2023.033893

    Abstract Multi-criteria decision making (MCDM) is a technique used to achieve better outcomes for some complex business-related problems, whereby the selection of the best alternative can be made in as many cases as possible. This paper proposes a model, the multi-criteria decision support method, that allows both service providers and consumers to maximize their profits while preserving the best matching process for resource allocation and task scheduling. The increasing number of service providers with different service provision capabilities creates an issue for consumers seeking to select the best service provider. Each consumer seeks a service provider… More >

  • Open Access

    ARTICLE

    Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment

    S. Stewart Kirubakaran1,*, V. P. Arunachalam1, S. Karthik1, S. Kannan2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1881-1895, 2023, DOI:10.32604/csse.2023.026690

    Abstract In the present scenario of rapid growth in cloud computing models, several companies and users started to share their data on cloud servers. However, when the model is not completely trusted, the data owners face several security-related problems, such as user privacy breaches, data disclosure, data corruption, and so on, during the process of data outsourcing. For addressing and handling the security-related issues on Cloud, several models were proposed. With that concern, this paper develops a Privacy-Preserved Data Security Approach (PP-DSA) to provide the data security and data integrity for the outsourcing data in Cloud… More >

  • Open Access

    ARTICLE

    An Integrated Framework for Cloud Service Selection Based on BOM and TOPSIS

    Ahmed M. Mostafa*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4125-4142, 2022, DOI:10.32604/cmc.2022.024676

    Abstract Many businesses have experienced difficulties in selecting a cloud service provider (CSP) due to the rapid advancement of cloud computing services and the proliferation of CSPs. Many independent criteria should be considered when evaluating the services provided by different CSPs. It is a case of multi-criteria decision-making (MCDM). This paper presents an integrated MCDM cloud service selection framework for determining the most appropriate service provider based on the best only method (BOM) and technique for order of preference by similarity to ideal solution (TOPSIS). To obtain the weights of criteria and the relative importance of… More >

  • Open Access

    ARTICLE

    Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method

    J. Stanly Jayaprakash1, Kishore Balasubramanian2, Rossilawati Sulaiman3, Mohammad Kamrul Hasan3,*, B. D. Parameshachari4, Celestine Iwendi5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 519-534, 2022, DOI:10.32604/cmc.2022.021269

    Abstract Many organizations apply cloud computing to store and effectively process data for various applications. The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity. In this research, an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data. Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data. Merkle Hash tree provides the efficient… More >

  • Open Access

    ARTICLE

    Binary Multifold Encryption Technique for Complex Cloud Systems

    N. Ansgar Mary1,*, T. Latha2

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1199-1213, 2022, DOI:10.32604/csse.2022.022404

    Abstract Data security is a major cloud computing issue due to different user transactions in the system. The evolution of cryptography and cryptographic analysis are regarded domains of current research. deoxyribo nucleic acid (DNA) cryptography makes use of DNA as a sensing platform, which is then manipulated using a variety of molecular methods. Many security mechanisms including knowledge-based authentication, two-factor authentication, adaptive authentication, multifactor authentication and single password authentication have been deployed. These cryptographic techniques have been developed to ensure confidentiality, but most of them are based on complex mathematical calculations and equations. In the proposed… More >

  • Open Access

    ARTICLE

    Enhanced Trust Based Access Control for Multi-Cloud Environment

    N. R. Rejin Paul1,*, D. Paul Raj2

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3079-3093, 2021, DOI:10.32604/cmc.2021.018993

    Abstract Security is an essential part of the cloud environment. For ensuring the security of the data being communicated to and from the cloud server, a significant parameter called trust was introduced. Trust-based security played a vital role in ensuring that the communication between cloud users and service providers remained unadulterated and authentic. In most cloud-based data distribution environments, emphasis is placed on accepting trusted client users’ requests, but the cloud servers’ integrity is seldom verified. This paper designs a trust-based access control model based on user and server characteristics in a multi-cloud environment to address… More >

  • Open Access

    ARTICLE

    Prediction of Cloud Ranking in a Hyperconverged Cloud Ecosystem Using Machine Learning

    Nadia Tabassum1, Allah Ditta2, Tahir Alyas3, Sagheer Abbas4, Hani Alquhayz5, Natash Ali Mian6, Muhammad Adnan Khan7,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3129-3141, 2021, DOI:10.32604/cmc.2021.014729

    Abstract Cloud computing is becoming popular technology due to its functional properties and variety of customer-oriented services over the Internet. The design of reliable and high-quality cloud applications requires a strong Quality of Service QoS parameter metric. In a hyperconverged cloud ecosystem environment, building high-reliability cloud applications is a challenging job. The selection of cloud services is based on the QoS parameters that play essential roles in optimizing and improving cloud rankings. The emergence of cloud computing is significantly reshaping the digital ecosystem, and the numerous services offered by cloud service providers are playing a vital… More >

Displaying 1-10 on page 1 of 7. Per Page