Authorized Redundant Check Support in a Hybrid Cloud Environment
A hybrid cloud is made up of public and private clouds connected by standardized or proprietary technologies to provide data and application mobility. The deduplication with uneven privileges issue in cloud computing is addressed efficiently. an architecture for a hybrid cloud that employs both publ...
| Main Authors: | Durgadevi, ., Shreedhara N, Hegde, Zuriani Hayati, Abdullah |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
INTI International University
2024
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/1937/ http://eprints.intimal.edu.my/1937/2/480 http://eprints.intimal.edu.my/1937/3/ij2024_15r.pdf |
Similar Items
Tamper localization for medical images using cyclic redundancy check (CRC)
by: Wan Nur Shakira Ain, Wan Ranizang
Published: (2013)
by: Wan Nur Shakira Ain, Wan Ranizang
Published: (2013)
Dual Access Control for Cloud Storage and Sharing
by: Sandeep, T.S., et al.
Published: (2024)
by: Sandeep, T.S., et al.
Published: (2024)
Disaster recovery with minimum replica plan for reliability
checking in multi-cloud
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
Firewall Redundancy Rules Filtering Using Integrity Rules Checking
by: Zarina, Dzolkhifli, et al.
Published: (2018)
by: Zarina, Dzolkhifli, et al.
Published: (2018)
Watermark redundancy using sudoku
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
Performance evaluation of task scheduling using hybrid meta-heuristic in heterogeneous cloud environment
by: A. Saif, Faten, et al.
Published: (2019)
by: A. Saif, Faten, et al.
Published: (2019)
Selecting A Cyclic Redundancy Check (CRC) Generator Polynomial for CEH (CRC Extension Header).
by: Supriyanto, Supriyanto, et al.
Published: (2009)
by: Supriyanto, Supriyanto, et al.
Published: (2009)
Disaster recovery in single-cloud and multi-cloud
environments: Issues and challenges
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
An adaptive flower pollination algorithm for minimizing software testing redundancy
by: M. N., Kabir, et al.
Published: (2017)
by: M. N., Kabir, et al.
Published: (2017)
Simulated Annealing Based Strategy for Test Redundancy Reduction
by: Kamal Z., Zamli, et al.
Published: (2014)
by: Kamal Z., Zamli, et al.
Published: (2014)
Skyline query processing for incomplete data in cloud environment
by: Gulzar, Yonis, et al.
Published: (2017)
by: Gulzar, Yonis, et al.
Published: (2017)
The Decentralized Non-Fungible Token Exchange with Secure Connections
by: Sharath, M.S., et al.
Published: (2024)
by: Sharath, M.S., et al.
Published: (2024)
Prediction of Fetal Health Status Using Machine Learning
by: Naidile S, Saragodu, et al.
Published: (2024)
by: Naidile S, Saragodu, et al.
Published: (2024)
In-building facial recognition check-in system
by: Yong, Li Jonn
Published: (2023)
by: Yong, Li Jonn
Published: (2023)
An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
A blind watermarking using redundant wavelet transform for copyright protection
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed
by: Ejaz, Ahmed
Published: (2016)
by: Ejaz, Ahmed
Published: (2016)
Short term forecasting based on hybrid least squares support vector machines
by: Zuriani, Mustaffa, et al.
Published: (2018)
by: Zuriani, Mustaffa, et al.
Published: (2018)
The Crop Price Prediction Using Machine Learning: Preliminary Stage
by: Ramya, T.K., et al.
Published: (2024)
by: Ramya, T.K., et al.
Published: (2024)
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security
by: Manjunatha, V., et al.
Published: (2024)
by: Manjunatha, V., et al.
Published: (2024)
Late Acceptance Hill Climbing Based Strategy for Test Redundancy Reduction and Prioritization
by: Rohani, Abu Bakar, et al.
Published: (2015)
by: Rohani, Abu Bakar, et al.
Published: (2015)
A blind watermarking technique using redundant wavelet transform for copyright protection
by: Ernawan, F., et al.
Published: (2018)
by: Ernawan, F., et al.
Published: (2018)
Improving targeting feedback for users with low visibility using visual redundant feedback
by: Sim, Dennis Chee Chow
Published: (2005)
by: Sim, Dennis Chee Chow
Published: (2005)
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016)
by: Shakir, Mohanaad, et al.
Published: (2016)
Data backup and recovery with a minimum replica plan in a multi-cloud environment
by: Alshammari, Mohammad Matar, et al.
Published: (2020)
by: Alshammari, Mohammad Matar, et al.
Published: (2020)
Utilizing first hop redundancy protocol to mitigate the effects of denial-of-service attack
by: Khong, Johnson
Published: (2018)
by: Khong, Johnson
Published: (2018)
SMS applications: Short Messaging & Result Checking System (SMRCS) / Lau Sook Wai
by: Lau , Sook Wai
Published: (2003)
by: Lau , Sook Wai
Published: (2003)
Consistency check between XML schema and class diagram for document versioning
by: Ibrahim, Rosziati, et al.
Published: (2018)
by: Ibrahim, Rosziati, et al.
Published: (2018)
Completion time driven hyper-heuristic approach for optimisation of scientific workflow scheduling in cloud environment / Ehab Nabiel Mohammad
by: Ehab Nabiel , Mohammad
Published: (2018)
by: Ehab Nabiel , Mohammad
Published: (2018)
Sistem pengesanan dan pembetulan ralat menggunakan teknik Hamming Codes dan Cyclic Redundency Check (CRC) (Decoder) / Wan Ramlah Wan Ibrahim
by: Wan Ramlah, Wan Ibrahim
Published: (2002)
by: Wan Ramlah, Wan Ibrahim
Published: (2002)
Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
Automated Software Tool Support for Checking the Inconsistency of Requirements
by: Kamalrudin, Massila
Published: (2009)
by: Kamalrudin, Massila
Published: (2009)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Pre-Fetch Data Caching Strategy in Mobile Database System for Integrity Constraints Checking
by: Zarina, Dzolkhifli, et al.
Published: (2015)
by: Zarina, Dzolkhifli, et al.
Published: (2015)
A hybrid approach to semi-supervised named entity recognition in health, safety and environment reports
by: Sari, Y., et al.
Published: (2009)
by: Sari, Y., et al.
Published: (2009)
A case study: establishing redundant access networks in the telecommunication sector of a developing country
by: Rahman, Mohammad Ziaur, et al.
Published: (2010)
by: Rahman, Mohammad Ziaur, et al.
Published: (2010)
BioHealthCloud: A Biometric Worldwide Public Cloud Infrastructure
by: M. A., Ameedeen, et al.
Published: (2014)
by: M. A., Ameedeen, et al.
Published: (2014)
A semantic interoperability framework for software as a service systems in cloud computing environments / Reza Rezaei
by: Reza, Rezaei
Published: (2014)
by: Reza, Rezaei
Published: (2014)
Identifying skylines in cloud databases with incomplete data
by: Gulzar, Yonis, et al.
Published: (2019)
by: Gulzar, Yonis, et al.
Published: (2019)
Hybrid test redundancy reduction strategy based on global neighborhood algorithm and simulated annealing
by: Kamal Z., Zamli, et al.
Published: (2018)
by: Kamal Z., Zamli, et al.
Published: (2018)
Similar Items
-
Tamper localization for medical images using cyclic redundancy check (CRC)
by: Wan Nur Shakira Ain, Wan Ranizang
Published: (2013) -
Dual Access Control for Cloud Storage and Sharing
by: Sandeep, T.S., et al.
Published: (2024) -
Disaster recovery with minimum replica plan for reliability
checking in multi-cloud
by: Alshammari, Mohammad Matar, et al.
Published: (2018) -
Firewall Redundancy Rules Filtering Using Integrity Rules Checking
by: Zarina, Dzolkhifli, et al.
Published: (2018) -
Watermark redundancy using sudoku
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)