Kullanım Kılavuzu
Neden sadece 3 sonuç görüntüleyebiliyorum?
Sadece üye olan kurumların ağından bağlandığınız da tüm sonuçları görüntüleyebilirsiniz. Üye olmayan kurumlar için kurum yetkililerinin başvurması durumunda 1 aylık ücretsiz deneme sürümü açmaktayız.
Benim olmayan çok sonuç geliyor?
Birçok kaynakça da atıflar "Soyad, İ" olarak gösterildiği için özellikle Soyad ve isminin baş harfi aynı olan akademisyenlerin atıfları zaman zaman karışabilmektedir. Bu sorun tüm dünyadaki atıf dizinlerinin sıkça karşılaştığı bir sorundur.
Sadece ilgili makaleme yapılan atıfları nasıl görebilirim?
Makalenizin ismini arattıktan sonra detaylar kısmına bastığınız anda seçtiğiniz makaleye yapılan atıfları görebilirsiniz.
 Görüntüleme 25
 İndirme 1
An Effective Double Verification-Based Method for Certifying Information Safety in Cloud Computing
2023
Dergi:  
International Journal of Intelligent Systems and Applications in Engineering
Yazar:  
Özet:

Abstract Cloud computing is an architectural concept that offers computation and storage space as a service as well as on-demand, dynamic access to any type of service over the Internet. Storage as a service is one of the major services offered. Data are stored and managed at a cloud provider's data centre using cloud computing services, which are entirely internet-based technology. Traditional cryptographic security based on the assumed difficulty of computer operations is facing tremendous challenges as a result of the evolution of information technology. The key concerns with cloud servers are successful safe communication and protecting sensitive data from unauthorized access on public networks. This protocol can be implemented using the exclusive-OR operation in traditional cryptography. Data security issues and supporting data security architecture are the key targets of this investigation. In the same way that it chooses a server for data storage that is quick, efficient, and light on resources, the system is made to prepare security procedures regardless of the order in which the data is stored. Cuckoo Search Algorithm (CSA) has been used to determine which available server is most suitable for a given task in wake-sleep distributed computing. Homomorphic encryption, where information is encrypted before being delivered to the server, is typically used to guarantee the veracity of the data being transmitted. To save on server resources and data storage, we've encrypted everything with ECDSA on the cloud server. It strengthens protections for user data in the cloud. At the end of the day, the system proves that data is secure, reliable, and private. Despite some drawbacks, this framework does provide safe methods of exchanging keys and backing up data, both of which are crucial for protecting the confidentiality of sensitive data kept in the cloud.

Anahtar Kelimeler:

Atıf Yapanlar
Bilgi: Bu yayına herhangi bir atıf yapılmamıştır.
Benzer Makaleler








International Journal of Intelligent Systems and Applications in Engineering

Alan :   Mühendislik

Dergi Türü :   Uluslararası

Metrikler
Makale : 1.632
Atıf : 486
International Journal of Intelligent Systems and Applications in Engineering