2023
DOI: 10.11591/ijict.v12i1.pp62-71
|View full text |Cite
|
Sign up to set email alerts
|

Cloud and internet-of-things secure integration along with security concerns

Abstract: <span lang="EN-US">Cloud computing is a new technology which refers to an infrastructure where both software and hardware application are operate for the network with the help of internet. Cloud computing provide these services with the help of rule know as you pay as you go on. Internet of things (IoT) is a new technology which is growing rapidly in the field of telecommunications. The aim of IoT devices is to connect all things around us to the Internet and thus provide us with smarter cities, intellig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…The specific file was then transferred to Google Cloud for verification using the KRDMCDLT to determine whether it was a rootkit or benign [19]. When this verification was conducted on the optimal launch system in windows 2022 against 64 rootkits [20], every test attempting to differentiate the cloud was unsuccessful. The rootkit [21], which targeted a brand-new boot system, was included in the tests.…”
Section: Resultsmentioning
confidence: 99%
“…The specific file was then transferred to Google Cloud for verification using the KRDMCDLT to determine whether it was a rootkit or benign [19]. When this verification was conducted on the optimal launch system in windows 2022 against 64 rootkits [20], every test attempting to differentiate the cloud was unsuccessful. The rootkit [21], which targeted a brand-new boot system, was included in the tests.…”
Section: Resultsmentioning
confidence: 99%
“…In this section, we present the different modified sections that took place in SVM by different research in different years. Table 2 (see in Appendix) presents the different categories of the result like the year, function, improvement, and objective of many researchers' modification in SVM for their research purpose [69]- [79]. In this research, we collect all the information related to SVM.…”
Section: Resultsmentioning
confidence: 99%
“…Once the program has been downloaded, the indicated protection measure will be implemented once it is present in the other node to which the file is being transferred. This makes the client node rootkit safe by ensuring that the incoming file cannot infect it [19].…”
Section: Methodsmentioning
confidence: 99%