Cloud computing sensitive data protection using multi layered approach
Cloud computing is a modern technology and it gives access to the network upon request to required computing resources (network, servers, storage, applications and services). This exciting computing model depends on data traffic and controlled by a third party. Despite the expected savings in infras...
| Main Authors: | Muhasin, Haifaa Jassim, Atan, Rodziah, A. Jabar, Marzanah, Abdullah, Salfarina |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2016
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/68843/ http://psasir.upm.edu.my/id/eprint/68843/1/Cloud%20computing%20sensitive%20data%20protection%20using%20multi%20layered%20approach.pdf |
Similar Items
The factors affecting on managing sensitive data in cloud computing
by: Jassim Muhasin, Haifaa, et al.
Published: (2018)
by: Jassim Muhasin, Haifaa, et al.
Published: (2018)
A multi-level framework for efficient sensitive data transmission in cloud computing
by: Muhasin, Haifaa Jassim
Published: (2019)
by: Muhasin, Haifaa Jassim
Published: (2019)
CloudZone: towards an integrity layer of cloud data storage based on multi agent system architecture
by: Mohamed, Amir Mohamed Talib, et al.
Published: (2011)
by: Mohamed, Amir Mohamed Talib, et al.
Published: (2011)
Formulating a security layer of cloud data storage framework based on multi agent system architecture.
by: Mohamed Talib, Amir, et al.
Published: (2010)
by: Mohamed Talib, Amir, et al.
Published: (2010)
Security framework of cloud data storage based on multi agent.
by: Mohamed Talib, Amir, et al.
Published: (2010)
by: Mohamed Talib, Amir, et al.
Published: (2010)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
A multi-analytical approach to predict the determinants of cloud computing adoption in higher education institutions
by: Qasem, Yousef A. M., et al.
Published: (2020)
by: Qasem, Yousef A. M., et al.
Published: (2020)
A framework of multi-agent system to facilitate security of cloud data storage
by: Mohamed Talib, Amir, et al.
Published: (2010)
by: Mohamed Talib, Amir, et al.
Published: (2010)
A hierarchical self-healing SLA for cloud computing
by: Mosallanejad, Ahmad, et al.
Published: (2014)
by: Mosallanejad, Ahmad, et al.
Published: (2014)
Multi agent system architecture oriented Prometheus methodology design to facilitate security of cloud data storage
by: Mohamed Talib, Amir, et al.
Published: (2011)
by: Mohamed Talib, Amir, et al.
Published: (2011)
Security framework of cloud data storage based on multi agent system architecture - a pilot study.
by: Mohamed Talib, Amir, et al.
Published: (2012)
by: Mohamed Talib, Amir, et al.
Published: (2012)
A hierarchical self-X SLA for cloud computing
by: Mosallanejad, Ahmad, et al.
Published: (2014)
by: Mosallanejad, Ahmad, et al.
Published: (2014)
Mobile agent based multi-layer security framework for cloud data centers
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Service level agreement checking in cloud computing in terms of verification and validation concepts
by: Mohd Jamail, Nor Shahida, et al.
Published: (2013)
by: Mohd Jamail, Nor Shahida, et al.
Published: (2013)
Cloud-based e-government (CBEG): a systematic literature review
by: Alkhilani, Wissam H. S., et al.
Published: (2024)
by: Alkhilani, Wissam H. S., et al.
Published: (2024)
SLA violations reduction for web-based education module in cloud computing education ecosystem.
by: Ahmad Mosallanejad,, et al.
Published: (2013)
by: Ahmad Mosallanejad,, et al.
Published: (2013)
Study of Security Layers Under Attack on Different Layers of Cloud Computing
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
Mapping and analyzing process of cloud-based education as a service (CEaaS) model for cloud computing adoption in higher education institutions
by: Qasem, Yousef Abdulelah Mohammed, et al.
Published: (2018)
by: Qasem, Yousef Abdulelah Mohammed, et al.
Published: (2018)
Genetic algorithms-based quality of service service selection in cloud computing using multilayer perceptron
by: Mosallanejad, Ahmad, et al.
Published: (2014)
by: Mosallanejad, Ahmad, et al.
Published: (2014)
Assessing and prioritizing crucial drivers for CloudIoT-based healthcare adoption: an analytic hierarchy process approach
by: Altawaiha, Iyad, et al.
Published: (2024)
by: Altawaiha, Iyad, et al.
Published: (2024)
Simulated annealing approach to cost-based multi- quality of service job scheduling in cloud computing enviroment
by: Abdullah, Monir, et al.
Published: (2014)
by: Abdullah, Monir, et al.
Published: (2014)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Big Data Processing in Cloud Computing Environments
by: Noraziah, Ahmad, et al.
Published: (2017)
by: Noraziah, Ahmad, et al.
Published: (2017)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
A three-step SEM-Bayesian network approach for predicting the determinants of CloudIoT-based healthcare adoption
by: Altawaiha, Iyad, et al.
Published: (2024)
by: Altawaiha, Iyad, et al.
Published: (2024)
Cascading guided search cloud service search engine
by: Arvaree@Alvar, Thamilvaani, et al.
Published: (2013)
by: Arvaree@Alvar, Thamilvaani, et al.
Published: (2013)
Analyzing continuance of cloud computing in higher education institutions: should we stay, or should we go?
by: Mohammed Qasem, Yousef A., et al.
Published: (2021)
by: Mohammed Qasem, Yousef A., et al.
Published: (2021)
Risk assessment for Big Data in cloud computing: trust as an impact
by: Yusof Ali, Hazirah Bee, et al.
Published: (2019)
by: Yusof Ali, Hazirah Bee, et al.
Published: (2019)
Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
by: Eldow, Abdalla, et al.
Published: (2019)
by: Eldow, Abdalla, et al.
Published: (2019)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
Intersection of geospatial big data, geocomputation and cloud computing
by: Amirian, Pouria, et al.
Published: (2015)
by: Amirian, Pouria, et al.
Published: (2015)
Protecting wireless data transmission in mobile application systems using digital watermarking technique
by: Mohamed, Kartini, et al.
Published: (2016)
by: Mohamed, Kartini, et al.
Published: (2016)
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
An Energy-Efficient Cross-Layer approach for cloud wireless green communications
by: Sadiq, Ali Safa, et al.
Published: (2017)
by: Sadiq, Ali Safa, et al.
Published: (2017)
An effective approach for managing power consumption in cloud computing infrastructure
by: Khalil Abd, Sura, et al.
Published: (2017)
by: Khalil Abd, Sura, et al.
Published: (2017)
Integration of scientific experimental data through ontology approach: a review
by: Azram, Nur Adila, et al.
Published: (2016)
by: Azram, Nur Adila, et al.
Published: (2016)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016)
by: Shakir, Mohanaad, et al.
Published: (2016)
Challenges in multi-layer data security for video steganography
by: Samar Kamil,, et al.
Published: (2018)
by: Samar Kamil,, et al.
Published: (2018)
Similar Items
-
The factors affecting on managing sensitive data in cloud computing
by: Jassim Muhasin, Haifaa, et al.
Published: (2018) -
A multi-level framework for efficient sensitive data transmission in cloud computing
by: Muhasin, Haifaa Jassim
Published: (2019) -
CloudZone: towards an integrity layer of cloud data storage based on multi agent system architecture
by: Mohamed, Amir Mohamed Talib, et al.
Published: (2011) -
Formulating a security layer of cloud data storage framework based on multi agent system architecture.
by: Mohamed Talib, Amir, et al.
Published: (2010) -
Security framework of cloud data storage based on multi agent.
by: Mohamed Talib, Amir, et al.
Published: (2010)