Securing cloud data using secret key 4 optimization algorithm (SK4OA) with a non-linearity run time trend
Frimpong Twum,
No information about this author
James Benjamin Hayfron Acquah,
No information about this author
Yaw Marfo Missah
No information about this author
et al.
PLoS ONE,
Journal Year:
2024,
Volume and Issue:
19(4), P. e0301760 - e0301760
Published: April 16, 2024
Cloud
computing
alludes
to
the
on-demand
availability
of
personal
computer
framework
resources,
primarily
information
storage
and
processing
power,
without
customer’s
direct
involvement.
has
developed
dramatically
among
many
organizations
due
its
benefits
such
as
cost
savings,
resource
pooling,
broad
network
access,
ease
management;
nonetheless,
security
been
a
major
concern.
Researchers
have
proposed
several
cryptographic
methods
offer
cloud
data
security;
however,
their
execution
times
are
linear
longer.
A
Security
Key
4
Optimization
Algorithm
(SK4OA)
with
non-linear
run
time
is
in
this
paper.
The
secret
key
SK4OA
determines
rather
than
size
able
transmit
large
volumes
minimal
bandwidth
resist
attacks
like
brute
force
since
timings
unpredictable.
set
from
Kaggle
was
used
determine
algorithm’s
mean
standard
deviation
after
thirty
(30)
execution.
Data
sizes
3KB,
5KB,
8KB,
12KB,
16
KB
were
study.
There
an
empirical
analysis
done
against
RC4,
Salsa20,
Chacha20
based
on
encryption
time,
decryption
throughput
memory
utilization.
showed
that
generated
lowest
5.545±2.785
when
16KB
executed.
Additionally,
SK4OA’s
greater,
indicating
observed
varied
far
mean.
However,
smaller
deviations
making
them
more
clustered
around
resulting
predictable
times.
Language: Английский
Securing the Cloud: An In-depth Exploration of Conceptual Models, Emerging Trends, and Forward-looking Insights
Research Square (Research Square),
Journal Year:
2023,
Volume and Issue:
unknown
Published: Oct. 19, 2023
Abstract
The
ascendancy
of
cloud
computing,
while
praising
scalability
and
flexibility,
simultaneously
unveils
a
convoluted
security
panorama.
This
review
talks
about
the
complicated
ideas
behind
models
in
environments.
It
combines
information
from
several
studies
to
show
how
has
changed,
where
it
is
now,
what
future
holds.
details
change
traditional
more
abstract,
data-centric,
user-access
control
models,
showing
people
are
trying
balance
new
technologies
cyber
threats.
Case
like
Capital
One
Data
Breach
add
discussion
by
things
work
real
world.
then
moves
on
summary
findings
that
important
have
dynamic,
proactive,
multifaceted
approaches.
Challenges
spanning
technical,
organisational,
regulatory
domains
elucidated,
spotlighting
gaps
beckoning
deeper
exploration
into
emerging
technologies'
implications
ethical
considerations
security.
paper
culminates
with
strategic
recommendations
for
varied
stakeholders
signals
towards
unexplored
avenues
research,
particularly
intertwining
potential
dimensions
Quantum
Computing
Blockchain.
seeks
act
as
lighthouse,
guiding
organisations,
researchers,
policymakers
through
murky
waters
offering
structured
pathway
secure,
resilient,
ethically
sound
future.
Language: Английский
Nature-based Natural-hazard Preparedness: A Cross Section of Categorized Examples
Journal of Environmental & Earth Sciences,
Journal Year:
2024,
Volume and Issue:
6(1), P. 33 - 44
Published: March 1, 2024
Despite
prevailing
interests,
no
rigorous
research
has
been
conducted
to
examine
the
role
of
nature
in
natural-hazard
preparedness.
This
systematic
review
aimed
describe
how
can
reduce
impacts
natural
hazards
during
preparedness
stage.
The
study
focuses
on
land,
water,
and
air
systems
three
types
stakeholders:
international
organizations,
developed
countries,
developing
countries.
Further,
it
provides
supplementary
strategies,
such
as
immediate
actions,
local
engagement,
development,
that
stakeholders
should
apply
enhance
their
nature-based
We
suggest
integrating
costs
benefits
analysis,
culture,
societal
challenges,
environmental
justice
into
implementation
solutions.
Finally,
this
outlines
framework
by
discussing
relationship
between
society.
Language: Английский
THE CONCEPT OF AUTOMATED COMPLIANCE VERIFICATION AS THE FOUNDATION OF A FUNDAMENTAL CLOUD SECURITY MODEL
Y. Matseniuk,
No information about this author
Andrii Partyka
No information about this author
Komp'ûternì sistemi ta merežì,
Journal Year:
2024,
Volume and Issue:
6(1), P. 108 - 123
Published: June 1, 2024
The
primary
objective
of
this
research
is
to
develop
an
advanced
automated
method
for
configuring
and
managing
public
cloud
accounts
subscriptions
on
prominent
platforms
such
as
AWS
GCP
Azure.
This
involves
the
application
standardized
configurations
ensure
optimal
performance
security
compliance.
A
significant
component
methodology
intermittent
scanning
infrastructure
these
subscriptions.
meticulously
designed
identify
address
any
deviations
or
non-compliance
issues
with
globally
recognized
standards
including
NIST
800-53
ISO
27001
HIPAA
PCIDSS.
approach
leverages
cutting-edge
automation
technologies
streamline
deployment
management
resources.
By
automating
aims
reduce
manual
effort
minimize
likelihood
human
error
enhance
operational
efficiency.
extends
continuous
monitoring
auditing
processes
enabling
real-time
detection
configuration
drifts
vulnerabilities.
Furthermore
delves
into
development
a
dynamic
responsive
system
capable
adapting
evolving
requirements
security.
plays
pivotal
role
in
aspect
providing
ongoing
assurance
that
environments
adhere
strictest
protocols
standards.
Continuous
compliance
critical
today's
ever-changing
digital
landscape
where
threats
data
privacy
are
increasingly
sophisticated.
integrating
proposed
promises
not
only
bolster
posture
but
also
offer
scalable
efficient
solution
management.
poised
set
new
standard
aligning
best
practices
IT
paving
way
more
secure
manageable
computing
practices.
Keywords:
Hosting
service
models.
Language: Английский
Risk factors for injury in kabaddi players and prevention: A systematic review
Hardiansyah Hardiansyah,
No information about this author
Ahmad Nasrulloh,
No information about this author
Sulistiyono Sulistiyono
No information about this author
et al.
Published: Dec. 30, 2024
Kabaddi
is
a
sport
prone
to
injury
due
the
intense
physical
contact
involved
in
game.
Injuries
are
significant
concerns
for
kabaddi
players,
and
understanding
both
factors
that
cause
injuries
preventive
measures
essential
minimizing
future
injuries.
The
purpose
of
this
study
analyze
identify
contributing
ways
prevent
them
players.
Data
collection
systematic
review
employed
several
comprehensive
strategies,
following
PRISMA
(Preferred
Reporting
Items
Systematic
Reviews
Meta-Analyses)
framework.
sources
used
were
Scopus,
PubMed,
Google
Scholar.
Researchers
searched
identified
four
journals,
published
between
2017
2024,
discuss
risk
prevention
including
improper
technique,
inadequate
warm-up,
insufficient
equipment,
contact-related
accidents.
Preventive
include
proper
mouth
protection,
strength
training
thigh
calf
muscles.
Strategies
minimize
occurrence
adjusting
frequency,
using
protective
implementing
biomechanical
techniques.
Language: Английский
Adverse effects of doping on human health: A sistematic review
Published: Dec. 31, 2024
Drugs
that
fall
into
the
category
of
doping
are
not
only
a
problem
in
world
sports
but
also
for
humans
involved
sports,
namely
athletes,
especially
problems
their
health.
Currently,
substances
contained
these
dangerous
drugs
found
supplements,
food,
and
drinks.
Consuming
things
poses
risk
to
health
athletes.
The
purpose
this
literature
review
is
provide
an
explanation
dangers
effects
preventing
diseases
can
attack
as
result
use
drugs.
research
method
used
systematic
(PRISMA)
selection
study
sources
Scopus,
PubMed,
Google
Scholar.
results
several
types
most
often
obtained,
such
(1)
Anabolic
Androgenic
Steroids
(AAS),
(2)
Beta-2
Agonists,
(3)
Stimulants.
conclusion
researchers
hope
be
education
about
or
impacts
caused
by
supplements
included
category.
Language: Английский