References
- S. M. P and V. Dr.D, "A Study of Data Storage Security Issues in Cloud Computing," Bonfring International Journal of Software Engineering and Soft Computing, vol. 9, no. 2, pp. 05-07, Apr. 2019, doi: 10.9756/bijsesc.9012.
- P. R. Kumar, P. H. Raj, and P. Jelciana, "Exploring Data Security Issues and Solutions in Cloud Computing," Procedia Computer Science, vol. 125, pp. 691-697, 2018, doi: 10.1016/j.procs.2017.12.089.
- A. Rath, B. Spasic, N. Boucart, and P. Thiran, "Security Pattern for Cloud SaaS: From System and Data Security to Privacy Case Study in AWS and Azure," Computers, vol. 8, no. 2, p. 34, May 2019, doi: 10.3390/computers8020034.
- A. El-Yahyaoui and M. D. Ech-Chrif El Kettani, "Data privacy in cloud computing," 2018 4th International Conference on Computer and Technology Applications (ICCTA), 2018, pp. 25-28, doi: 10.1109/CATA.2018.8398650.
- Y. Sharma, H. Gupta and S. K. Khatri, "A Security Model for the Enhancement of Data Privacy in Cloud Computing," 2019 Amity International Conference on Artificial Intelligence (AICAI), 2019, pp. 898-902, doi: 10.1109/AICAI.2019.8701398.
- S. Liu, K. Yue, H. Yang, L. Liu, X. Duan, and T. Guo, "The Research on SaaS Model Based on Cloud Computing," 2018 2nd IEEE Advanced Information Management, Communicates,Electronic and Automation Control Conference (IMCEC), 2018, pp. 1959-1962, doi: 10.1109/IMCEC.2018.8469462.
- M. Saraswat and R. C. Tripathi, "Cloud Computing: Analysis of Top 5 CSPs in SaaS, PaaS and IaaS Platforms," 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), 2020, pp. 300-305, doi: 10.1109/SMART50582.2020.9337157.
- S. Y. AbdelGhany and H. Mamdouh Hassan, "Get as you Pay Model for IaaS Cloud Computing," 2018 International Conference on Smart Communications and Networking (SmartNets), 2018, pp. 1-6, doi: 10.1109/SMARTNETS.2018.8707412.
- M. Hussein, M. Mousa, and M. Alqarni, "A placement architecture for a container as a service (CaaS) in a cloud environment", Journal of Cloud Computing, vol. 8, no. 1, 2019. Available: 10.1186/s13677-019-0131-1.
- E. C. Branco, J. M. Monteiro, R. R. de C. e Silva, and J. C. Machado, "A New Approach to Preserving Data Confidentiality in the Cloud," Proceedings of the 20th International Database Engineering & Applications Symposium on - IDEAS '16, 2016, doi: 10.1145/2938503.2938512.
- K. El Makkaoui, A. Ezzati, and A. Beni-Hssane, "Securely Adapt a Paillier Encryption Scheme to Protect the Data Confidentiality in the Cloud Environment," Proceedings of the International Conference on Big Data and Advanced Wireless Technologies - BDAW '16, 2016, doi: 10.1145/3010089.3016026.
- A. Jain and R. Kumar, "Confidentiality Enhanced Security Model for Cloud Environment," Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies - ICTCS '16, 2016, doi: 10.1145/2905055.2905199.
- G. Zhang, Z. Yang, and W. Liu, "Blockchain-based privacy preserving e-health system for healthcare data in cloud," Computer Networks, p. 108586, Nov. 2021, doi: 10.1016/j.comnet.2021.108586.
- Y.T. Huang, D.L. Chiang, T. S. Chen, S.D. Wang, F.P. Lai, and Y.D. Lin, "Lagrange interpolation-driven access control mechanism: Towards secure and privacy-preserving fusion of personal health records," Knowledge-Based Systems, vol. 236, p. 107679, Jan. 2022, doi: 10.1016/j.knosys.2021.107679.
- M. Rizwan et al., "Risk monitoring strategy for confidentiality of healthcare information," Computers and Electrical Engineering, vol. 100, p. 107833, May 2022, doi: 10.1016/j.compeleceng.2022.107833.
- A. Hambouz, Y. Shaheen, A. Manna, M. Al-Fayoumi and S. Tedmori, "Achieving Data Integrity and Confidentiality Using Image Steganography and Hashing Techniques," 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS), 2019, pp. 1-6, doi: 10.1109/ICTCS.2019.8923060
- S. Godi and R. Kurra, "Novel security issues and mitigation measures in cloud computing: an Indian perspective," International Journal of Computer Applications in Technology, vol. 58, no. 4, p. 267, 2018, doi: 10.1504/ijcat.2018.10017214.
- L. Zhang, X. Gao, L. Kang, P. Liang, and Y. Mu, "Distributed Ciphertext-Policy Attribute-Based Encryption With Enhanced Collusion Resilience and Privacy Preservation," IEEE Systems Journal, vol. 16, no. 1, pp. 735-746, Mar. 2022, doi: 10.1109/jsyst.2021.3072793.
- P. Jain, M. Gyanchandani, and N. Khare, "Enhanced Secured Map Reduce layer for Big Data privacy and security," Journal of Big Data, vol. 6, no. 1, Mar. 2019, doi: 10.1186/s40537-019-0193-4.
- H. Al-Balasmeh, M. Singh, and R. Singh, "Framework of data privacy preservation and location obfuscation in vehicular cloud networks," Concurrency and Computation: Practice and Experience, vol. 34, no. 5, Oct. 2021, doi: 10.1002/cpe.6682.
- M. Shivashankar and S. A. Mary, "Privacy preservation of data using modified rider optimization algorithm: Optimal data sanitization and restoration model," Expert Systems, vol. 38, no. 3, Jan. 2021, doi: 10.1111/exsy.12663.
- M. Patel, A. M. Patel, and R. B. Gandhi, "Prime numbers and their analysis," Journal of Emerging Technologies and Innovative Research, vol. 7, no. 2, pp. 1-5, Mar. 2020, doi: ISSN-2349-5162.
- M. Herrero-Collantes and J. C. Garcia-Escartin, "Quantum random number generators," Reviews of Modern Physics, vol. 89, no. 1, Feb. 2017, doi: 10.1103/revmodphys.89.015004.
- Y. Li, H.-L. Wei, Stephen. A. Billings, and P. G. Sarrigiannis, "Identification of nonlinear time-varying systems using an online sliding-window and common model structure selection (CMSS) approach with applications to EEG," International Journal of Systems Science, vol. 47, no. 11, pp. 2671-2681, Mar. 2015, doi: 10.1080/00207721.2015.1014448
- D. Bellizia, G. Palumbo, G. Scotti and A. Trifiletti, "A Novel Very Low Voltage Topology to implement MCML XOR Gates," 2018 14th Conference on Ph.D. Research in Microelectronics and Electronics (PRIME), 2018, pp. 157-160, doi: 10.1109/PRIME.2018.8430320.
- M. Thangapandiyan, P. M. R. Anand and K. S. Sankaran, "Enhanced Cloud Security Implementation Using Modified ECC Algorithm," 2018 International Conference on Communication and Signal Processing (ICCSP), 2018, pp. 1019-1022, doi: 10.1109/ICCSP.2018.8524212.
- Ankur, Divyanjali and T. Bhardwaj, "A dissection of pseudorandom number generators," 2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN), 2015, pp. 318-323, doi: 10.1109/SPIN.2015.7095369.
- K. Ali, F. Akhtar, S. A. Memon, A. Shakeel, A. Ali and A. Raheem, "Performance of Cryptographic Algorithms based on Time Complexity," 2020 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), 2020, pp. 1-5, doi: 10.1109/iCoMET48670.2020.9073930.
- I. H. Latif, "Time Evaluation Of Different Cryptography Algorithms Using Labview," IOP Conference Series: Materials Science and Engineering, vol. 745, no. 1, p. 012039, Feb. 2020, doi: 10.1088/1757-899x/745/1/012039.
- R. E. J. Paje, A. M. Sison, and R. P. Medina, "Multidimensional key RC6 algorithm," Proceedings of the 3rd International Conference on Cryptography, Security and Privacy - ICCSP '19, 2019, doi: 10.1145/3309074.3309095.
- R. Masram, V. Shahare, J. Abraham, and R. Moona, "Analysis and Comparison of Symmetric Key Cryptographic Algorithms Based on Various File Features," International Journal of Network Security & Its Applications, vol. 6, no. 4, pp. 43-52, Jul. 2014, doi: 10.5121/ijnsa.2014.6404.
- A. Bentajer, M. Hedabou, K. Abouelmehdi, and S. Elfezazi, "CS-IBE: A Data Confidentiality System in Public Cloud Storage System," Procedia Computer Science, vol. 141, pp. 559-564, 2018, doi: 10.1016/j.procs.2018.10.126.
- K. Priya and J. ArokiaRenjit, "Data security and confidentiality in public cloud storage by extended QP protocol," 2017 International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC), 2017, pp. 235-240, doi: 10.1109/ICCPEIC.2017.8290369.
- K. Timraz, T. Barhoom and T. Fatayer, "A Confidentiality Scheme for Storing Encrypted Data through Cloud," 2019 IEEE 7th Palestinian International Conference on Electrical and Computer Engineering (PICECE), 2019, pp. 1-5, doi: 10.1109/PICECE.2019.8747193.
- D. Li, J. Wu, J. Le, X. Liao and T. Xiang, "A Novel Privacy-Preserving Location-Based Services Search Scheme in Outsourced Cloud," in IEEE Transactions on Cloud Computing, doi: 10.1109/TCC.2021.3098420.
- L. Prabahar, R. Sukumar, and R. SureshBabu, "CCSC-DHKEP: Data Confidentiality Using Improved Security Approaches in Cloud Environment," Wireless Personal Communications, vol. 122, no. 4, pp. 3633-3647, Sep. 2021, doi: 10.1007/s11277-021-09104-9.
- "English to French translations," www.kaggle.com. https://www.kaggle.com/datasets/digvijayyadav/frenchenglish/metadata (accessed May 09, 2022).
- A. M. Mohamed and H. Minn, "Low-Complexity Algorithm for Radio Astronomy Observation Data Transport in an Integrated NGSO Satellite Communication and Radio Astronomy System," in IEEE Open Journal of the Communications Society, vol. 2, pp. 2342-2356, 2021, doi: 10.1109/OJCOMS.2021.3115720.
- Z. Hasan, C. P. Agrawal and M. Agrawal, ""Online Transaction Security Enhancement": An Algorithm Based on Cryptography," 2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), 2019, pp. 1-4, doi: 10.1109/ICICT46931.2019.8977669.
- Y. M. Gajmal and R. Udayakumar, "Privacy and Utility-Assisted Data Protection Strategy for Secure Data Sharing and Retrieval in Cloud System," Information Security Journal: A Global Perspective, pp. 1-15, Jun. 2021, doi: 10.1080/19393555.2021.1933270.
- H. Liu, X. Lu, S. Duan, Y. Zhang and Y. Xiang, "An Efficient Oblivious Random Data Access Scheme in Cloud Computing," in IEEE Transactions on Cloud Computing, doi: 10.1109/TCC.2022.3173260.
- J. Mero, M. Leinonen, H. Makkonen, and H. Karjaluoto, "Agile logic for SaaS implementation: Capitalizing on marketing automation software in a start-up," Journal of Business Research, vol. 145, pp. 583-594, Jun. 2022, doi: 10.1016/j.jbusres.2022.03.026.