Enhanced Security in Cloud Computing Using Neural Network and Encryption

被引:0
|
作者
Sana, Muhammad Usman [1 ]
Li, Zhanli [1 ]
Javaid, Fawad [2 ]
Liaqat, Hannan Bin [3 ]
Ali, Muhammad Usman [1 ]
机构
[1] College of Computer Science and Technology, Xi'An University of Science and Technology, Xi'an, China
[2] Department of Communication and Information Engineering, Xi'An University of Science and Technology, Xi'an, China
[3] Department of Information Technology, University of Gujrat, Punjab, Gujrat, Pakistan
关键词
40;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:145785 / 145799
相关论文
共 50 条
  • [1] Enhanced Security in Cloud Computing Using Neural Network and Encryption
    Sana, Muhammad Usman
    Li, Zhanli
    Javaid, Fawad
    Bin Liaqat, Hannan
    Ali, Muhammad Usman
    IEEE ACCESS, 2021, 9 : 145785 - 145799
  • [2] CLOUD COMPUTING DATA SECURITY USING ENCRYPTION ALGORITHMS
    Rithvik, Kumar
    Kaur, Simran
    Sejwal, Shilpa
    Narwal, Priti
    Jain, Prateek
    IIOAB JOURNAL, 2019, 10 (02) : 75 - 82
  • [3] 3-Multi ranked encryption with enhanced security in cloud computing
    Kim, YeEun
    Son, Junggab
    Parizi, Reza M.
    Srivastava, Gautam
    Oh, Heekuck
    DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (02) : 313 - 326
  • [4] 3-Multi ranked encryption with enhanced security in cloud computing
    YeEun Kim
    Junggab Son
    Reza MParizi
    Gautam Srivastava
    Heekuck Oh
    Digital Communications and Networks, 2023, 9 (02) : 313 - 326
  • [5] Enhanced Cloud Computing Security and Integrity Verification via Novel Encryption Techniques
    Kaur, Ranjit
    Singh, Raminder Pal
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1227 - 1233
  • [6] Cloud Computing Security by Integrating Classical Encryption
    Goodarzi, Koorosh
    Karimi, Abbas
    MEDICAL AND REHABILITATION ROBOTICS AND INSTRUMENTATION (MRRI2013), 2014, 42 : 320 - 326
  • [7] Homomorphic Encryption for Data Security in Cloud Computing
    Chauhan, Kamal Kumar
    Sanger, Amit K. S.
    Verma, Ajai
    2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, : 206 - 209
  • [8] Security in Voip Network Using Neural Network and Encryption Techniques
    Galande, Ashwini
    Londhe, Dattatraya
    Balpande, Mangesh
    INFORMATION AND NETWORK TECHNOLOGY, 2011, 4 : 223 - 227
  • [9] On Artificial Neural Network used in Cloud Computing Security - A Survey
    Nita, Stefania Loredana
    Mihailescu, Marius Iulian
    PROCEEDINGS OF THE 2018 10TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI), 2018,
  • [10] Research on Computer Network Security Vulnerabilities and Encryption Technology in Cloud Computing Environment
    Peng P.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)