Preserving security using crisscross AES and FCFS scheduling in cloud computing.
K. RamkumarG. GunasekaranPublished in: Int. J. Adv. Intell. Paradigms (2019)
Keyphrases
- cloud computing
- security issues
- cloud computing environment
- cloud storage
- data privacy
- network access
- computing resources
- identity management
- utility computing
- data management
- computing infrastructure
- cloud services
- data center
- distributed computing
- trusted computing
- service providers
- big data
- scheduling policies
- scheduling algorithm
- security mechanisms
- computing technologies
- business models
- advanced encryption standard
- network security
- information security
- intrusion detection
- load balancing
- encryption algorithm
- security policies
- grid computing
- access control
- cloud computing platform
- databases
- round robin
- private cloud
- load balance
- virtual machine
- cloud platform
- secret key
- computing platform
- encryption scheme
- security requirements
- service oriented
- database systems