Enhanced Security in Cloud Computing Using Neural Network and Encryption

被引:0
|
作者
Sana, Muhammad Usman [1 ]
Li, Zhanli [1 ]
Javaid, Fawad [2 ]
Liaqat, Hannan Bin [3 ]
Ali, Muhammad Usman [1 ]
机构
[1] College of Computer Science and Technology, Xi'An University of Science and Technology, Xi'an, China
[2] Department of Communication and Information Engineering, Xi'An University of Science and Technology, Xi'an, China
[3] Department of Information Technology, University of Gujrat, Punjab, Gujrat, Pakistan
关键词
40;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:145785 / 145799
相关论文
共 50 条
  • [21] Enhanced Data Integrity Encryption Algorithm for Cloud Computing
    Mothlabeng, Moloko P.
    Muchenje, Tonderai
    Mathonsi, Topside E.
    Du Plessis, Deon P.
    5TH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, BIG DATA, COMPUTING AND DATA COMMUNICATION SYSTEMS (ICABCD2022), 2022,
  • [22] Resilient Back Propagation Neural Network Security Model For Containerized Cloud Computing
    Almiani, Muder
    Abughazleh, Alia
    Jararweh, Yaser
    Razaque, Abdul
    SIMULATION MODELLING PRACTICE AND THEORY, 2022, 118
  • [23] Federated Cloud Computing Security using Forward-Secure Broadcast Encryption HIBE
    Rekaby, Fayza
    Abd El-Aziz, A. A.
    Mahmood, Mahmood A.
    Hefny, Hesham A.
    2015 11TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2015, : 13 - 18
  • [24] Analytical Method to Compute the Cloud Computing Data Security Issues by Using Encryption Algorithms
    Khan, Abdul Hannan
    Hasnain, Syed Anwer
    Siddiqui, Shahan Yamin
    Irshad, Muhammad Sohail
    Sajid, Muhammad
    Iqbal, Shahid
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2020, 7 (28) : 1 - 17
  • [25] Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing
    Shabbir, Maryam
    Shabbir, Ayesha
    Iwendi, Celestine
    Javed, Abdul Rehman
    Rizwan, Muhammad
    Herencsar, Norbert
    Lin, Jerry Chun-Wei
    IEEE ACCESS, 2021, 9 : 8820 - 8834
  • [26] Encryption key management as a trusted security as a service for cloud computing
    Fehis, Saad
    Nouali, Omar
    Kechadi, Mohand-Tahar
    International Journal of Security and Networks, 2021, 16 (03) : 150 - 162
  • [27] A Hybrid Model Encryption for Enhancing Data Security in Cloud Computing
    Zibouh, Ouadia
    Dalli, Anouar
    Drissi, Hilal
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT THROUGH VISION 2020, 2019, : 3840 - 3849
  • [28] A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security
    El-Yahyaoui, Ahmed
    Ech-Cherif El Kettani, Mohamed Dafir
    TECHNOLOGIES, 2019, 7 (01):
  • [29] Deployment of Application on Cloud and Enhanced Data Security in Cloud Computing using ECC Algorithm
    Puri, Neha A.
    Karare, Ajay R.
    Dharmik, Rajesh. C.
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 1667 - 1671
  • [30] A cloud computing security solution based on fully homomorphic encryption
    Zhao, Feng
    Li, Chao
    Liu, Chun Feng
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 485 - 488