Framework design for secured local cloud data query processing analysis
Cloud computing is a vastly growing technology that enables more users and organizations to transfer their services to the cloud. With the exploitation of public cloud computing infrastructures, the usage of clouds to provide data query services is becoming an attractive solution due to its num...
| Main Authors: | Mohd Aman, Azana Hafizah, Al-Mayyah, Zainalabideen Ali Rahemm, Hassan, Rosilah, Hassan Abdalla Hashim, Aisha, Mohamed Sid Ahmed, Amjed Sid Ahmed, Jubair, Ahmed Mahdi |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2019
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/79662/ http://irep.iium.edu.my/79662/1/79662_Framework%20Design%20for%20Secured_complete.pdf http://irep.iium.edu.my/79662/2/79662_Framework%20Design%20for%20Secured_scopus.pdf |
Similar Items
Performance analysis for cloud query encryption
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
Investigation of internet of things handover process for information centric networking and proxy mobile internet protocol
by: Mohd Aman, Azana Hafizah, et al.
Published: (2019)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2019)
Simulation study of HMIPV6 and M-HMIPV6/CXTP
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Securing medical data transmission systems based on integrating algorithm of encryption and steganography
by: Hashim, Mohammed Mahdi, et al.
Published: (2020)
by: Hashim, Mohammed Mahdi, et al.
Published: (2020)
Evaluation of the performance of e-commerce using the analytic hierarchy process (AHP): business perspectives on e-commerce / Sid Sirisukha
by: Sirisukha, Sid
Published: (2017)
by: Sirisukha, Sid
Published: (2017)
Quantitative Evaluation for PMPIv6 Multicast Fast Reroute Operations
by: Azana Hafizah Mohd, Aman, et al.
Published: (2017)
by: Azana Hafizah Mohd, Aman, et al.
Published: (2017)
Artificial Neural Network in Seismic Reflection Method for
Measuring Asphalt Pavement Thickness
by: Sid Ahmed Remmani, Sid Ahmed Remmani, et al.
Published: (2023)
by: Sid Ahmed Remmani, Sid Ahmed Remmani, et al.
Published: (2023)
The study on entrepreneurial orientation, market orientation and sustainable performance among contractors
by: Chahi, Sid Ali
Published: (2019)
by: Chahi, Sid Ali
Published: (2019)
Simulation analysis for multicast context delivery network mobility management
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017)
Mathematical evaluation of context transfer and multicast fast reroute in multicast enabled network mobility management
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017)
Service recovery of multicast hierarchical mobile IPV6 with context transfer
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
The study of signaling cost of M-HMIPV6 with context transfer
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Packet loss in M-HMIPV6 with context transfer
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Evaluation handover latency in M-HMIPV6 with context transfer
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Architecture of M-HMIPV6/CXTP
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Intra domain movement of M-HMIPV6/CXTP
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Inter domain movement of M-HMIPV6/CXTP
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Message format of M-HMIPV6/CXTP
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Signaling flow of M-HMIPV6/CXTP
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Development of the service recovery time and signaling cost function
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Evaluation methods in computer networking
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
The study of multicast hierarchical mobile IPV6
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Multicast support in network based mobility management: Current challenges and solutions
by: Mohd Aman, Azana Hafizah, et al.
Published: (2016)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2016)
Skyline query processing for incomplete data in cloud environment
by: Gulzar, Yonis, et al.
Published: (2017)
by: Gulzar, Yonis, et al.
Published: (2017)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)
by: Jaber, Aws Naser, et al.
Published: (2015)
Research direction in mobile IPV6
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
HMIPV6 based approaches for mobility management
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Handover analysis for multicast enabled network mobility management using network simulator
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017)
Performance evaluation on packet loss cost of an enhanced mobile multicast service in proxy network mobility
by: Mohd Aman, Azana Hafizah, et al.
Published: (2016)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2016)
Effectiveness of blended active learning framework using Bring Your Own Device Learning (BYODL), Project Based Learning (PPBL) and Gamification Learning (GL)
by: Azana Hafizah Mohd Aman,, et al.
Published: (2021)
by: Azana Hafizah Mohd Aman,, et al.
Published: (2021)
A novel fast reroute signaling cost for multicast proxy mobility
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Development of heuristic task scheduling algorithm in cloud computing
by: Diallo, Laouratou, et al.
Published: (2016)
by: Diallo, Laouratou, et al.
Published: (2016)
Evaluation of an enhanced multicast data flow technique in network mobility
by: Mohd Aman, Azana Hafizah, et al.
Published: (2016)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2016)
Advance signaling cost for multicast fast reroute proxy mobility management
by: Mohd Aman, Azana Hafizah, et al.
Published: (2016)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2016)
Future directions
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Security aspects and efforts towards secure Internet of things
by: Wan Abdul Rahman, Wan Fariza, et al.
Published: (2017)
by: Wan Abdul Rahman, Wan Fariza, et al.
Published: (2017)
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
by: Othman, Marini, et al.
Published: (2007)
by: Othman, Marini, et al.
Published: (2007)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Exploring Aspects Of Design And Safety Of Children Playgrounds In Malaysia
by: Md. Saaid , Ahmad Sid Hijaz
Published: (2016)
by: Md. Saaid , Ahmad Sid Hijaz
Published: (2016)
Similar Items
-
Performance analysis for cloud query encryption
by: Ali Raheem, Zainalabideen, et al.
Published: (2019) -
Investigation of internet of things handover process for information centric networking and proxy mobile internet protocol
by: Mohd Aman, Azana Hafizah, et al.
Published: (2019) -
Simulation study of HMIPV6 and M-HMIPV6/CXTP
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011) -
Securing medical data transmission systems based on integrating algorithm of encryption and steganography
by: Hashim, Mohammed Mahdi, et al.
Published: (2020) -
Evaluation of the performance of e-commerce using the analytic hierarchy process (AHP): business perspectives on e-commerce / Sid Sirisukha
by: Sirisukha, Sid
Published: (2017)