Performance analysis for cloud query encryption
The clouds computing comprises of information inquiry benefits that is versatile and adaptable in costing. Cloud purchasers ordinarily put away secret or fragile information that required to be sheltered and verified. Accordingly, delicate information is encoded for security and classification. A fe...
| Main Authors: | Ali Raheem, Zainalabideen, Mohd Aman, Azana Hafizah, Islam, Shayla, Hassan Abdalla Hashim, Aisha |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2019
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/81567/ http://irep.iium.edu.my/81567/1/81567_Performance%20Analysis%20for%20Cloud%20Query%20Encryption_new.pdf |
Similar Items
Handover analysis for multicast enabled network mobility management using network simulator
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017)
Framework design for secured local cloud data query processing analysis
by: Mohd Aman, Azana Hafizah, et al.
Published: (2019)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2019)
Securing medical data transmission systems based on integrating algorithm of encryption and steganography
by: Hashim, Mohammed Mahdi, et al.
Published: (2020)
by: Hashim, Mohammed Mahdi, et al.
Published: (2020)
Simulation analysis for multicast context delivery network mobility management
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017)
Quantitative Evaluation for PMPIv6 Multicast Fast Reroute Operations
by: Azana Hafizah Mohd, Aman, et al.
Published: (2017)
by: Azana Hafizah Mohd, Aman, et al.
Published: (2017)
Performance evaluation on packet loss cost of an enhanced mobile multicast service in proxy network mobility
by: Mohd Aman, Azana Hafizah, et al.
Published: (2016)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2016)
Mathematical evaluation of context transfer and multicast fast reroute in multicast enabled network mobility management
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017)
Investigation of internet of things handover process for information centric networking and proxy mobile internet protocol
by: Mohd Aman, Azana Hafizah, et al.
Published: (2019)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2019)
Performance evaluation of multi-interfaced fast handoff scheme for PNEMO Environment
by: Islam, Shayla, et al.
Published: (2018)
by: Islam, Shayla, et al.
Published: (2018)
Packet loss and packet delivery evaluation using network simulator for multicast enabled network nobility management
by: Mohd Aman, Hazana Afizah, et al.
Published: (2017)
by: Mohd Aman, Hazana Afizah, et al.
Published: (2017)
Performance aAnalysis of HRO-B+ scheme for the nested mobile networks using OPNet
by: Shayma, Senan, et al.
Published: (2017)
by: Shayma, Senan, et al.
Published: (2017)
MM-PNEMO: a mathematical model to assess handoff delay
and packet loss
by: Islam, Shayla, et al.
Published: (2019)
by: Islam, Shayla, et al.
Published: (2019)
The rise of internet of things and big data on the cloud: challenges and future trends
by: Laouratou, Diallo, et al.
Published: (2017)
by: Laouratou, Diallo, et al.
Published: (2017)
Hardware prototyping of an efficient encryption engine
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2010)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2010)
Phase offset analysis of asymmetric communications infrastructure in smart grid
by: Hasan, Mohammad Kamrul, et al.
Published: (2019)
by: Hasan, Mohammad Kamrul, et al.
Published: (2019)
Performance analysis of multicast ad-hoc on-demand distance vector (MAODV) routing protocol
by: Suryady, Zeldi, et al.
Published: (2014)
by: Suryady, Zeldi, et al.
Published: (2014)
Macro mobility scheme in NEMO to support seamless handoff
by: Islam, Shayla, et al.
Published: (2012)
by: Islam, Shayla, et al.
Published: (2012)
Performance analysis of constrained device virtualization algorithm
by: Haseeb, Shariq, et al.
Published: (2020)
by: Haseeb, Shariq, et al.
Published: (2020)
Development of heuristic task scheduling algorithm in cloud computing
by: Diallo, Laouratou, et al.
Published: (2016)
by: Diallo, Laouratou, et al.
Published: (2016)
A novel artificial intelligence based timing synchronization scheme for smart grid applications
by: Hasan, Mohammad Kamrul, et al.
Published: (2020)
by: Hasan, Mohammad Kamrul, et al.
Published: (2020)
Analysis of cost minimization methods in geo-distributed data centers
by: Khalaf, Ayesheh Ahrari, et al.
Published: (2016)
by: Khalaf, Ayesheh Ahrari, et al.
Published: (2016)
Femtocell Network Time Synchronization Protocols and Schemes
by: Hasan, M.K., et al.
Published: (2012)
by: Hasan, M.K., et al.
Published: (2012)
Rijndael encryption technique: authentication for computer application
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
Multicast support in network based mobility management: Current challenges and solutions
by: Mohd Aman, Azana Hafizah, et al.
Published: (2016)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2016)
CDR analysis using big data technology
by: Elagib, Sara B., et al.
Published: (2016)
by: Elagib, Sara B., et al.
Published: (2016)
Hierarchical route optimization scheme using advanced binding update list (BUL+) for nested mobile networks
by: Shayma, Senan, et al.
Published: (2017)
by: Shayma, Senan, et al.
Published: (2017)
Development of an autonomous remote access water quality monitoring system
by: Ranjbar, Md. Reza, et al.
Published: (2017)
by: Ranjbar, Md. Reza, et al.
Published: (2017)
A scalable routing protocol for hybrid wireless mesh networks
by: Mahmod, Zainab Senan, et al.
Published: (2012)
by: Mahmod, Zainab Senan, et al.
Published: (2012)
An Investigation of Femtocell Network Synchronization
by: Hasan, Mohammad Kamrul, et al.
Published: (2011)
by: Hasan, Mohammad Kamrul, et al.
Published: (2011)
Performance evaluation of ad hoc on-demand distance vector routing protocol under video streaming
by: Ahmed, Diaa Eldin Mustafa, et al.
Published: (2018)
by: Ahmed, Diaa Eldin Mustafa, et al.
Published: (2018)
The effect of network’s size on the performance of the gateway discovery and selection scheme for MANEMO
by: Mahmod, Zainab S., et al.
Published: (2017)
by: Mahmod, Zainab S., et al.
Published: (2017)
The effect of network’s size on the performance of the gGateway discovery and selection scheme for MANEMO
by: Zainab S., Mahmod, et al.
Published: (2017)
by: Zainab S., Mahmod, et al.
Published: (2017)
Security aspects and efforts towards secure Internet of things
by: Wan Abdul Rahman, Wan Fariza, et al.
Published: (2017)
by: Wan Abdul Rahman, Wan Fariza, et al.
Published: (2017)
طريقة حديثة لدفق ملفات الفيديو اعتمادا علي تقنية تخطي وبناء الاطر
by: Khalifa, Othman Omran, et al.
Published: (2016)
by: Khalifa, Othman Omran, et al.
Published: (2016)
Quality of service over heterogeneous network with MPLS back bone
by: Mahmoud, Omer, et al.
Published: (2012)
by: Mahmoud, Omer, et al.
Published: (2012)
Performance evaluation of joint path and spectrum diversity based routing protocol in Cognitive Radio Ad Hoc Networks under critical conditions
by: Che-Aron, Zamree, et al.
Published: (2015)
by: Che-Aron, Zamree, et al.
Published: (2015)
Performance evaluation of best route and broadcast strategy for NDN producer’s mobility
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2019)
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2019)
Hybrid approach support Qos for mobile users
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2014)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2014)
Evaluation of MIPv6 approach to provide multicast to mobile nodes
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2014)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2014)
Cluster-based multi-hop vehicular communication with multi-metric optimization
by: Alawi, Mahmoud, et al.
Published: (2012)
by: Alawi, Mahmoud, et al.
Published: (2012)
Similar Items
-
Handover analysis for multicast enabled network mobility management using network simulator
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017) -
Framework design for secured local cloud data query processing analysis
by: Mohd Aman, Azana Hafizah, et al.
Published: (2019) -
Securing medical data transmission systems based on integrating algorithm of encryption and steganography
by: Hashim, Mohammed Mahdi, et al.
Published: (2020) -
Simulation analysis for multicast context delivery network mobility management
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017) -
Quantitative Evaluation for PMPIv6 Multicast Fast Reroute Operations
by: Azana Hafizah Mohd, Aman, et al.
Published: (2017)