Security enhancement of the cloud paradigm using a novel optimized crypto mechanism.
Kishan Kumar SinghVijay Kumar JhaPublished in: Multim. Tools Appl. (2023)
Keyphrases
- security protocols
- cloud computing
- security protection
- cloud storage
- information security
- security requirements
- private key
- network security
- security policies
- security mechanisms
- mobile agent system
- security issues
- image enhancement
- intrusion detection
- access control
- cloud computing environment
- statistical databases
- virtual machine
- image processing
- security analysis
- security systems
- security level
- operating system
- security threats
- cloud services
- encryption algorithms
- authentication mechanism
- peer to peer