Privacy Concerns due to Class Elements in Cloud Environments despite Full Homomorphic Encryption
Cloud computing signifies a structural shift towards zero clients and traditionally integrated computational supplies. Because cloud computing does not provide the client with complete governance over the cloud, concerns have surfaced pertaining to data confidentiality, particularly to the misuse or...
| Main Authors: | Jaber, Aws Naser, Mazlina, Abdul Majid, Kamal Z., Zamli, Mohamad Fadli, Zolkipli |
|---|---|
| Format: | Article |
| Language: | English |
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/7329/ http://umpir.ump.edu.my/id/eprint/7329/1/ICIT_2015.pdf |
Similar Items
Processing Data in Cloud Environments without the Need for Decryption
by: Jaber, Aws Naser, et al.
by: Jaber, Aws Naser, et al.
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)
by: Jaber, Aws Naser, et al.
Published: (2015)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
Use of Cryptography in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2013)
by: Jaber, Aws Naser, et al.
Published: (2013)
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018)
by: Lim, Tsu Chean, et al.
Published: (2018)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
A Conceptual Model Using The Elliptic Curve Diffie–Hellman With An Artificial Neural Network Over Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2016)
by: Jaber, Aws Naser, et al.
Published: (2016)
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
by: Shaikh, Muhammad Umair, et al.
Published: (2020)
by: Shaikh, Muhammad Umair, et al.
Published: (2020)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Comparative Performance Analysis of Bat Algorithm and Bacterial Foraging Optimization Algorithm using Standard Benchmark Functions
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm
by: Shaikh, Muhammad Umair, et al.
Published: (2020)
by: Shaikh, Muhammad Umair, et al.
Published: (2020)
Present Status and Challenges in Cloud Monitoring Framework: A Survey
by: Jaber, Aws Naser, et al.
Published: (2016)
by: Jaber, Aws Naser, et al.
Published: (2016)
Influence of Sample Preparation and Extraction Time on Chemical Composition of Steam Distillation Derived Patchouli Oil
by: Asdarina, Yahya, et al.
Published: (2013)
by: Asdarina, Yahya, et al.
Published: (2013)
Dusun Eco 1
by: Library, UMP
Published: (2010)
by: Library, UMP
Published: (2010)
Dusun Eco 2
by: Library, UMP
Published: (2010)
by: Library, UMP
Published: (2010)
dusun eco 3
by: Library, UMP
Published: (2010)
by: Library, UMP
Published: (2010)
Dusun Eco 4
by: Library, UMP
Published: (2010)
by: Library, UMP
Published: (2010)
Dusun Eco 5
by: Library, UMP
Published: (2010)
by: Library, UMP
Published: (2010)
Gambar Audit 5S
by: Library, UMP
Published: (2010)
by: Library, UMP
Published: (2010)
RFID 3 Trial - Book Conveyor
by: Amelia, Hasan
by: Amelia, Hasan
Gambar Perabot Perpustakaan UTEM
by: Library, UMP
Published: (2010)
by: Library, UMP
Published: (2010)
Book Conveyor Testing Document
by: Amelia, Hasan
by: Amelia, Hasan
Detail design of waste plastic bottles rescue boat
by: Law, Xue Ni
Published: (2012)
by: Law, Xue Ni
Published: (2012)
RFID Conveyor (check 1st trial)
by: Amelia, Hasan
Published: (2014)
by: Amelia, Hasan
Published: (2014)
RFID Conveyor (check 2nd trial).
by: Amelia, Hasan
Published: (2014)
by: Amelia, Hasan
Published: (2014)
RFID Conveyor (Check Bin)
by: Amelia, Hasan
Published: (2014)
by: Amelia, Hasan
Published: (2014)
RFID Conveyor (Check pada Virtua)
by: Amelia, Hasan
by: Amelia, Hasan
A new algorithm for normal and large-scale optimization problems: Nomadic People Optimizer
by: Alsewari, Abdul Rahman Ahmed, et al.
Published: (2019)
by: Alsewari, Abdul Rahman Ahmed, et al.
Published: (2019)
Intermetallic Growth and Shear Strength of SAC305/EN-Boron
by: Hardinnawirda, Kahar, et al.
Published: (2016)
by: Hardinnawirda, Kahar, et al.
Published: (2016)
A Review: Lead Free Solder and Its Wettability Properties
by: Ervina Efzan, Ervina Efzan, et al.
Published: (2016)
by: Ervina Efzan, Ervina Efzan, et al.
Published: (2016)
Di Sebalik Penubuhan Eyes of UMP
by: Pejabat, Naib Canselor UMP
Published: (2014)
by: Pejabat, Naib Canselor UMP
Published: (2014)
Strategi Lautan Biru UMP Bersama ECERDC Dalam Membangunkan Masyarakat Luar Bandar
by: Zainal, Bahari
Published: (2014)
by: Zainal, Bahari
Published: (2014)
Zikir Terapi Ajaib Ubat Kegersangan Hati
by: Shahrul Nizam, Md. Ahir
Published: (2014)
by: Shahrul Nizam, Md. Ahir
Published: (2014)
Bakat Kepimpinan Bentuk Pasukan Berprestasi Tinggi
by: Mohd Raizalhilmy, Mohd Rais
Published: (2014)
by: Mohd Raizalhilmy, Mohd Rais
Published: (2014)
Wiki for the Academic Writing Classroom
by: Nik Aloesnita, Nik Mohd Alwi, et al.
Published: (2010)
by: Nik Aloesnita, Nik Mohd Alwi, et al.
Published: (2010)
Seminar Pengurusan ILMU 2010
by: Library, UMP
Published: (2010)
by: Library, UMP
Published: (2010)
Similar Items
-
Processing Data in Cloud Environments without the Need for Decryption
by: Jaber, Aws Naser, et al. -
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015) -
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022) -
Use of Cryptography in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2013) -
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)