User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 19
 Downloands 4
Designing a Security Framework for Mitigating Flaws in Cloud Based Web Hosting for Privacy and Confidentiality Services
2023
Journal:  
International Journal of Intelligent Systems and Applications in Engineering
Author:  
Abstract:

Abstract The rapid growth in popularity of computing clouds has attracted and allowed intensive processing on resource-constrained client devices. Smart mobiles can install data- and computation-intensive programs thanks to the demand service model utilized by distant data centers Outsourcing personal and sensitive data to far-off data centers, on the other hand, creates significant privacy and security issues. It is necessary to improve the traditional advanced encryption standard (AES) algorithm in order to fulfill the rising security concerns in the cloud. Among the various advantages presented in this research are, for example, increased data security and owner privacy. The encryption speed is increased from 128 to 1000 bits per second with the help of a double round key. There was once a round key that could handle 800 blocks per second. Network trust and resource management may be enhanced while consuming less power and better load balancing by adopting the suggested strategy. In the proposed framework, AES will be utilized with plain text sized at 16, 32, 64, and 128 bytes. The simulation results are shown to show how well the algorithm meets quality standards. The proposed architecture, according to the results, reduces energy use by 14.43%, network utilization by 11.533%, and delay by 15.673%. This new design increases security while also making better use of resources and reducing the amount of time it takes to build new computational cloud services.

Keywords:

Citation Owners
Information: There is no ciation to this publication.
Similar Articles










International Journal of Intelligent Systems and Applications in Engineering

Field :   Mühendislik

Journal Type :   Uluslararası

Metrics
Article : 1.632
Cite : 489
2023 Impact : 0.054
International Journal of Intelligent Systems and Applications in Engineering