The Synergy of Blockchain and Artificial Intelligence in Fintech: Revolutionizing the Financial Landscape DOI

Raghib Noman,

Mohammad Shahid, Mahfooz Alam

et al.

Published: Oct. 25, 2023

Language: Английский

A comprehensive study on cybersecurity challenges and opportunities in the IoT world DOI Open Access
Aejaz Nazir Lone, Suhel Mustajab, Mahfooz Alam

et al.

Security and Privacy, Journal Year: 2023, Volume and Issue: 6(6)

Published: April 12, 2023

Abstract It has become possible to link anything and everything the Internet in recent decades due expanding of Things (IoT). As a result, our usage technology changed lot, causing digital disruption real world. IoT allows drones, sensors, set‐top boxes, surveillance cameras, wearable technology, medical equipment be connected internet. Healthcare, manufacturing, utilities, transportation, housing are among various sectors that intelligent. Recently, we have seen surge cybersecurity challenges opportunities for improvement applications. Although extensively researched, there is dearth studies exclusively focus on evolution area AI machine learning, blockchain zero trust, lightweight security, integration with 5G networks, many more The availability environment‐capturing sensors internet‐connected tracking devices private life cloud data transmission. Therefore, significant problem researchers developers ensure CIA (Confidentiality, Integrity, Availability) security triangle people. This paper presents comprehensive study applications, challenges, architectural layer, attacks against related issues highlighted. Furthermore, along strength weaknesses existing techniques discussed detail. Our will provide insight into current research trends

Language: Английский

Citations

55

Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions DOI
Mahfooz Alam, Mohammad Shahid, Suhel Mustajab

et al.

The Journal of Supercomputing, Journal Year: 2024, Volume and Issue: 80(8), P. 11491 - 11555

Published: Jan. 27, 2024

Language: Английский

Citations

11

Cloud Computing: Architecture, Vision, Challenges, Opportunities, and Emerging Trends DOI
Mahfooz Alam, Suhel Mustajab, Mohammad Shahid

et al.

2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), Journal Year: 2023, Volume and Issue: unknown, P. 829 - 834

Published: Nov. 3, 2023

Cloud computing stands at the forefront of a technological revolution, fundamentally altering provisioning, utilization, and administration resources. This paper conducts comprehensive examination visionary aspects, obstacles, possibilities inherent in cloud computing. It delves deep into foundational principles distinguishing features this technology, showcasing its capacity to redefine realm information technology. Additionally, it scrutinizes hurdles encountered when embracing while spotlighting potential benefits offers both organizations individuals. By grasping effectively confronting challenges, capitalizing on opportunities hand, businesses can fully exploit computing's drive innovation, enhance operational efficiency, achieve unprecedented scalability. Our study aims offer insights emerging trends developments field

Language: Английский

Citations

14

Auditing of Outsourced Data in Cloud Computing: An Overview DOI

Haider Ali,

Shafiqul Abidin,

Mahfooz Alam

et al.

2022 9th International Conference on Computing for Sustainable Global Development (INDIACom), Journal Year: 2024, Volume and Issue: unknown, P. 111 - 117

Published: Feb. 28, 2024

One of the key facets this paradigm shift is outsourcing data storage and management to third-party cloud service providers (CSPs). The auditing outsourced a crucial component since it essential upholding accountability confidence. Verification validation integrity, access control, regulatory compliance are all part auditing. loss physical control over storage, opaqueness provider operations, worries about privacy confidentiality some difficulties associated with data. This paper examines potential avenues for growth in field computing. As more businesses rely on services, critical guarantee accuracy, safety, their also provides an in-depth overview concept computing, delving into challenges, existing solutions, future directions pivotal field.

Language: Английский

Citations

4

Securing IoT Communications: A Novel Lightweight Stream Cipher Using DNA Cryptography and Grain-80 Cipher DOI
Mohammad Ubaidullah Bokhari, Shahnwaz Afzal, Imran Khan

et al.

SN Computer Science, Journal Year: 2025, Volume and Issue: 6(2)

Published: Jan. 22, 2025

Language: Английский

Citations

0

Survey on Secure Scientific Workflow Scheduling in Cloud Environments DOI Creative Commons

Hadeel Amjed Saeed,

Sufyan Al-Janabi, Esam Taha Yassen

et al.

Future Internet, Journal Year: 2025, Volume and Issue: 17(2), P. 51 - 51

Published: Jan. 21, 2025

In cloud computing environments, the representation and management of data through workflows are crucial to ensuring efficient processing. This paper focuses on securing scientific workflow scheduling, which involves executing complex data-processing tasks with specific dependencies. The security intermediate data, often transmitted between virtual machines during execution, is critical for maintaining integrity confidentiality workflows. review analyzes methods scheduling in emphasizing application principles such as confidentiality, authentication, integrity. Various algorithms, including heuristics metaheuristics, examined their effectiveness balancing constraints like execution time cost.

Language: Английский

Citations

0

A Levelized Multiple Workflow Heterogeneous Earliest Finish Time Allocation Model for Infrastructure as a Service (IaaS) Cloud Environment DOI Creative Commons
Farheen Bano, Faisal Ahmad, Mohammad Shahid

et al.

Algorithms, Journal Year: 2025, Volume and Issue: 18(2), P. 99 - 99

Published: Feb. 10, 2025

Cloud computing, a superset of heterogeneous distributed allows sharing geographically dispersed resources across multiple organizations on rental basis using virtualization as per demand. In cloud workflow allocation to achieve the optimum schedule has been reported be NP-hard. This paper proposes Levelized Multiple Workflow Heterogeneous Earliest Finish Time (LMHEFT) model optimize makespan in computing environment. The two phases: task prioritization and allocation. phase begins by dividing workflows into number partitions level attribute; after that, upward rank is employed determine partition-wise order. phase, best-suited virtual machine determined offer lowest finish time for each mapping minimize task’s completion time. considers inter-task communication between cooperative tasks. A comparative performance evaluation LMHEFT conducted with competitive models from literature implemented MATLAB, i.e., earliest (HEFT) dynamic scheduling (DLS), makespan, flowtime, utilization. experimental findings indicate that surpasses HEFT DLS terms 15.51% 85.12% when varying workflows, 41.19% 86.73% depth levels, 13.74% 80.24% machines, respectively. Further statistical analysis carried out confirm hypothesis developed simulation study normality tests, homogeneity Kruskal–Wallis test.

Language: Английский

Citations

0

Real-time workflow scheduling in hybrid clouds with privacy and security constraints: A deep reinforcement learning approach DOI
Haoyang He, Yan Gu, Yang Hu

et al.

Expert Systems with Applications, Journal Year: 2025, Volume and Issue: unknown, P. 127376 - 127376

Published: March 1, 2025

Language: Английский

Citations

0

Elevating manufacturing excellence with multilevel optimization in smart factory cloud computing using hybrid model DOI

Saurabh Vaidya,

Gordhan Jethava

Cluster Computing, Journal Year: 2025, Volume and Issue: 28(5)

Published: April 28, 2025

Language: Английский

Citations

0

Efficient Resource Utilization in IoT and Cloud Computing DOI Creative Commons
Vivek Kumar Prasad, Debabrata Dansana, Madhuri Bhavsar

et al.

Information, Journal Year: 2023, Volume and Issue: 14(11), P. 619 - 619

Published: Nov. 19, 2023

With the proliferation of IoT devices, there has been exponential growth in data generation, placing substantial demands on both cloud computing (CC) and internet infrastructure. CC, renowned for its scalability virtual resource provisioning, is paramount importance e-commerce applications. However, dynamic nature services introduces unique challenges, notably establishment service-level agreements (SLAs) continuous monitoring compliance. This paper presents a versatile framework adaptation applications to CC environments. It comprehensive set metrics designed support SLAs by enabling periodic assessments, ensuring alignment with objectives (SLOs). policy-driven approach seeks automate management era thereby reducing dependency extensive human intervention culminates case study that demonstrates practical utilization policies resources. Furthermore, it provides valuable insights into requisites deploying within realms CC. holistic holds potential streamline administration services, ultimately enhancing their efficiency reliability.

Language: Английский

Citations

9