A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization
Authors
Keywords
-
Journal
Journal of King Saud University-Computer and Information Sciences
Volume 34, Issue 6, Pages 2343-2358
Publisher
Elsevier BV
Online
2020-10-22
DOI
10.1016/j.jksuci.2020.10.015
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Suppressed K-Anonymity Multi-Factor Authentication Based Schmidt-Samoa Cryptography for privacy preserved data access in cloud computing
- (2020) K. Mohana Prabha et al. COMPUTER COMMUNICATIONS
- A Secure Fog-Based Architecture for Industrial Internet of Things and Industry 4.0
- (2020) Jayasree Sengupta et al. IEEE Transactions on Industrial Informatics
- Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing
- (2018) S. Thanga Revathi et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems
- (2018) Chun-Ta Li et al. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE
- PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT
- (2018) Sana Belguith et al. Computer Networks
- Secure integration of IoT and Cloud Computing
- (2018) Christos Stergiou et al. Future Generation Computer Systems-The International Journal of eScience
- A machine learning application for reducing the security risks in hybrid cloud networks
- (2018) D. Praveena et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Grey Wolf optimisation-based feature selection and classification for facial emotion recognition
- (2018) Ninu Preetha Nirmala Sreedharan et al. IET Biometrics
- PriGuarder: A Privacy-Aware Access Control Approach Based on Attribute Fuzzy Grouping in Cloud Environments
- (2018) Li Lin et al. IEEE Access
- An IoT-Oriented data placement method with privacy preservation in cloud environment
- (2018) Xiaolong Xu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Privacy-preserving public auditing for secure data storage in fog-to-cloud computing
- (2018) Hui Tian et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Multi-key privacy-preserving deep learning in cloud computing
- (2017) Ping Li et al. Future Generation Computer Systems-The International Journal of eScience
- System modelling and performance evaluation of a three-tier Cloud of Things
- (2017) Wei Li et al. Future Generation Computer Systems-The International Journal of eScience
- Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption
- (2017) Abdulatif Alabdulatif et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
- Systematic Data Placement Optimization in Multi-Cloud Storage for Complex Requirements
- (2016) Maomeng Su et al. IEEE TRANSACTIONS ON COMPUTERS
- Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
- (2016) Tao Jiang et al. IEEE TRANSACTIONS ON COMPUTERS
- Analysis of Stability, Local Convergence, and Transformation Sensitivity of a Variant of the Particle Swarm Optimization Algorithm
- (2016) Mohammad Reza Bonyadi et al. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION
- Security in cloud computing: Opportunities and challenges
- (2015) Mazhar Ali et al. INFORMATION SCIENCES
- Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations
- (2015) Myeonggil Choi et al. Sustainability
- A new metaheuristic algorithm based on shark smell optimization
- (2014) Oveis Abedinia et al. COMPLEXITY
- Threshold prediction for segmenting tumour from brain MRI scans
- (2014) M. Marsaline Beno et al. INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY
- Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds
- (2014) Piotr K. Tysowski et al. IEEE Transactions on Cloud Computing
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationPublish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn More