2021
DOI: 10.1155/2021/8113253
|View full text |Cite
|
Sign up to set email alerts
|

A New Secure Model for Data Protection over Cloud Computing

Abstract: The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the clou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 28 publications
0
9
0
Order By: Relevance
“…Hierarchical search agents exist in the GWO algorithm. Equations ( 16) and ( 17) use mathematics to illustrate how encircling occurs as grey wolves hunt their prey (17).…”
Section: Traditional Gwo Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…Hierarchical search agents exist in the GWO algorithm. Equations ( 16) and ( 17) use mathematics to illustrate how encircling occurs as grey wolves hunt their prey (17).…”
Section: Traditional Gwo Algorithmmentioning
confidence: 99%
“…In the suggested Hybrid Fragment Horde Bland Lobo Optimization, the PSO method's criteria are blended with the GWO algorithm. Equations ( 15) and ( 16) illustrate the mathematical model of the prey enclosure in the proposed approach, whereas Equations (17) show the hunting strategy's mathematical model (18). The location has been updated, which is the main reformation in the recommended paradigm.…”
Section: Hybrid Fragment Horde Bland Lobo Optimizationmentioning
confidence: 99%
See 1 more Smart Citation
“…This research as the use of cloud computing has completely altered how computer services can be delivered, there are dangers related to security [7]. This study presents a methodology that addresses important security issues associated with cloud computing challenges, such as limiting harmful data entry and protecting users from false identities [7]. To ensure security and scalability for data sharing, the paradigm places an extreme value on security without sacrificing usability.…”
Section: A New Secure Model For Data Protection Over Cloud Computingmentioning
confidence: 99%
“…To ensure security and scalability for data sharing, the paradigm places an extreme value on security without sacrificing usability. Subsequent research endeavors will encompass the application of the model to medical data, strengthening protections against diverse hazards, and maximizing computing setups [7]. The analysis additionally suggests developing a secure service composition for inclusive policy-based cloud computing management.…”
Section: A New Secure Model For Data Protection Over Cloud Computingmentioning
confidence: 99%