2021
DOI: 10.1007/s00607-021-00942-w
|View full text |Cite
|
Sign up to set email alerts
|

A job scheduling algorithm based on rock hyrax optimization in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 64 publications
0
4
0
Order By: Relevance
“…Finally, they demonstrate the effectiveness and applicability of their plan with an execution outcome and effectiveness review. Though numerous research publications suggested efficient techniques to swiftly reply to cloud users in order to maintain a large resource pool [19]- [21] but security issues are still present in cloud storage, in this research [4], the researchers suggest a remote data integrity auditing technique that enables data exchange with concealed sensitive data. A sanitizer is utilized in this method to turn the data block's signatures into correct arguments for the cleaned file while also cleaning the data blocks that correspond to the file's sensitive information.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, they demonstrate the effectiveness and applicability of their plan with an execution outcome and effectiveness review. Though numerous research publications suggested efficient techniques to swiftly reply to cloud users in order to maintain a large resource pool [19]- [21] but security issues are still present in cloud storage, in this research [4], the researchers suggest a remote data integrity auditing technique that enables data exchange with concealed sensitive data. A sanitizer is utilized in this method to turn the data block's signatures into correct arguments for the cleaned file while also cleaning the data blocks that correspond to the file's sensitive information.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, they demonstrate the effectiveness and applicability of their plan with an execution outcome and effectiveness review. Though numerous research publications suggested efficient techniques to swiftly reply to cloud users in order to maintain a large resource pool [17][18][19][20] but security issues are still present in cloud storage, in this research [4], the researchers suggest a remote data integrity auditing technique that enables data exchange with concealed sensitive data. A sanitizer is utilized in this method to turn the data block's signatures into correct arguments for the cleaned file while also cleaning the data blocks that correspond to the file's sensitive information.…”
Section: Related Workmentioning
confidence: 99%
“…The rock hyrax, known scientifically as Procavia capensis, is a small, furry mammal that inhabits rocky habitats throughout sub-Saharan Africa and along the Arabian Peninsula’s coast [ 15 , 38 ]. These mammals live in colonies of 50 members that are often dominated by a single male who protects the territory.…”
Section: System Modelmentioning
confidence: 99%