2020
DOI: 10.1515/comp-2020-0206
|View full text |Cite
|
Sign up to set email alerts
|

A novel homomorphic RASD framework for secured data access and storage in cloud computing

Abstract: In the distributed computing worldview, the client and association’s information is put away remotely on the cloud server. Clients and associations can get to applications, administrations, and foundation on-request from a cloud server through the internet, withstanding the various advantages, numerous difficulties, and issues that endure verifying cloud information access and capacity. These difficulties have featured additional security and protection issues as cloud specialist co-ops are exclusively in char… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 47 publications
0
9
0
Order By: Relevance
“…Checked ransomware at runtime on the host victim's Cloud computer and evaluated attacks on an anonymous executable attempting to reach the internet. A number of unwanted API calls with LVQ2 output were detected using the equation threshold (4)(5)(6) and detected inside the unpacked unrecognised executable [1]. Figures 2 and 3 indicate the classification of different IP Spoofings with memcaching using SDL-VQ.…”
Section: Experimental Results and Comparisonmentioning
confidence: 99%
See 4 more Smart Citations
“…Checked ransomware at runtime on the host victim's Cloud computer and evaluated attacks on an anonymous executable attempting to reach the internet. A number of unwanted API calls with LVQ2 output were detected using the equation threshold (4)(5)(6) and detected inside the unpacked unrecognised executable [1]. Figures 2 and 3 indicate the classification of different IP Spoofings with memcaching using SDL-VQ.…”
Section: Experimental Results and Comparisonmentioning
confidence: 99%
“…The separations between the uncertain service call information vector and the sprinter up are almost identical to each other, i.e. the extracted information is directly related to either a malicious or benevolent call [4]. On the payload off that X = Current undisclosed call vector intelligence provider.…”
Section: Delineation Of Supervised Deep Learning Vector Quantization mentioning
confidence: 98%
See 3 more Smart Citations