


default search action
International Journal of Cloud Computing, Volume 12
Volume 12, Number 1, 2023
- Dilay Parmar, Padmaja Joshi, Udai Pratap Rao, A. Sathish Kumar, Ashwin Nivangune:

A discovery and selection protocol for decentralised cloudlet systems. 1-22 - Sebastian Floerecke, Christoph Ertl, Alexander Bogislav Herzfeldt:

Major drivers for the rising dominance of the hyperscalers in the infrastructure as a service market segment. 23-39 - Alaeldin Alkhasawneh, Fawaz A. Khasawneh:

Legal issues of consumer privacy protection in the cloud computing environment: analytic study in GDPR, and USA legislations. 40-62 - Sivasamy Ramasamy, N. Paranjothi:

Modelling of a cloud platform via M/M1 + M2/1 queues of a Jackson network. 63-71 - Raziqa Masood, Nitin Pandey, Q. P. Rana:

Towards P2P dynamic-hash-table-based public auditing for cloud data privacy, security and integrity. 72-89 - Zdzislaw Polkowski, Sambit Kumar Mishra, Brojo Kishore Mishra, Samarjeet Borah, Anita Mohanty:

Impact of internet of things in social and agricultural domains in rural sector: a case study. 90-105
Volume 12, Numbers 2/3/4, 2023
- Sandhya Narayanan, Philip Samuel, Mariamma Chacko:

Data centric redundancy elimination for network data traffic. 107-117 - I. G. Hemanandhini, R. Pavithra, P. Sugantha Priyadharshini:

Minimising power utilisation in cloud data centres using optimised virtual machine migration and rack consolidation. 118-133 - R. Suganya, Niju P. Joseph, R. Rajadevi, S. Ramamoorthy:

Enhancing the job scheduling procedure to develop an efficient cloud environment using near optimal clustering algorithm. 134-147 - M. Jeyakarthic, N. Subalakshmi:

Energy saving slot allocation-based multicast routing in cloud wireless mesh network. 148-162 - Mohamed M. Abbassy, Waleed M. Ead:

Fog computing-based public e-service application in service-oriented architecture. 163-177 - N. Krishnamoorthy, K. Venkatachalam, R. Manikandan, P. Prabhu:

Novel task assignment policies using enhanced hyper-heuristic approach in cloud. 178-190 - P. S. Prakash, S. Balakrishnan, K. Venkatachalam, Saravana Balaji Balasubramanian:

A new method for human activity identification using convolutional neural networks. 191-200 - Shiny Mukkath I., Nirmala Devi M.:

PUF based on chip comparison technique for trustworthy scan design data security against side channel attack. 201-223 - D. Karthika, K. Kalaiselvi:

Parallel progressive-based inductive subspace and fuzzy-based firefly algorithm for high ensemble data clustering. 224-245 - N. Jayashri, K. Kalaiselvi:

Secured file transmission in knowledge management-cloud. 246-260 - Manoranjan Parhi, Binod Kumar Pattanayak:

An effective mechanism for ontology-based cloud service discovery and selection using Aneka cloud application platform. 261-276 - Swetha P, Dayananda Rangapura Basavaraju:

A customer churn prediction model in telecom industry using Improved_XGBoost. 277-294 - Silambarasan Elkana Ebinazer, Nickolas Savarimuthu, S. Mary Saira Bhanu:

A hybrid encryption for secure data deduplication the cloud. 295-307 - Avijit Mondal, Radha Tamal Goswami:

Ad-hoc networks: new detection and prevention approach to malicious attacks using Honeypot. 308-323 - Nasr Almurisi, Srinivasulu Tadisetty:

Development of innovative cloud-based IoMD architecture for elder population monitoring. 324-339 - Imad Lamouik, Ali Yahyaouy, My Abdelouahed Sabri:

Distributed multi-cluster dynamic Q-routing for large size traffic grids. 340-353 - Mohan Nagamunthala, R. Manjula:

Self-evident rapid and scalable fortification encryption with data access organise in multiuser cloud environments. 354-366 - Rani, Amita Malik:

Resource-aware routing in opportunistic networks: existing protocols and open research issues. 367-398 - T. Shreekumar, K. Karunakara:

Hybrid dense matching features for cloud-based face recognition. 399-423 - M. P. Abdul Razaak, Gufran Ahmad Ansari:

Greedy-based task scheduling algorithm for minimising energy and power consumption for virtual machines in cloud environment. 424-434
Volume 12, Number 5, 2023
- S. Meena, V. Gayathri:

Preserving personal health records security and privacy using C-R3D algorithm and multimodal biometric authentication. 435-449 - B. S. Kiruthika Devi

, T. Subbulakshmi
:
Intrusion detection and prevention of DDoS attacks in cloud computing environment: a review on issues and current methods. 450-481 - A. Syed Ismail, S. Asha:

A novel redundancy technique to enhance the security of cloud computing. 482-496 - S. Palani

, K. Ramesh Babu:
EARA-PSOCAE: an energy aware resource allocation and particle swarm optimisation based cryptographic algorithm in e-healthcare cloud environment. 497-513 - Shahbaz Afzal, G. Kavitha, Amir Ahmad Dar

:
An application of Taguchi L16 method for optimisation of load balancing process parameters in cloud computing. 514-529
Volume 12, Number 6, 2023
- Basappa B. Kodada

, Demian Antony D'Mello
:
FSACE: finite state automata-based client-side encryption for secure data deduplication in cloud computing. 531-555 - Deepak Kapgate

:
Predictive data centre selection scheme for response time optimisation in cloud computing. 556-574 - Shreya Oswal, Shubham Gundawar, Varun Modani, Ashwini Shingare:

Automation of franchise-based data storage, management and analysis using Amazon Web Services. 575-585 - Narayani Raman, Aisha Banu Wahab:

PSO optimised workflow scheduling and VM replacement algorithm using gaming concept in cloud data centre. 586-604 - Isha Agarwal, Swati Gupta

, Ravi Shankar Singh:
A novel hybrid algorithm for workflow scheduling in cloud. 605-620

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














