<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Intelligent and Secured Cloud Service Management Using Smart Data Hashing Algorithm</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Keturu</forename><surname>Madan</surname></persName>
							<email>madan.keturu@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">Sreyas Institute of Engineering and Technology</orgName>
								<orgName type="institution" key="instit2">Nagole</orgName>
								<address>
									<settlement>Bandlaguda</settlement>
									<region>Hyderabad</region>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Srinivasa</forename><surname>Ponaganti</surname></persName>
							<email>psrinivasraocse@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">Sreyas Institute of Engineering and Technology</orgName>
								<orgName type="institution" key="instit2">Nagole</orgName>
								<address>
									<settlement>Bandlaguda</settlement>
									<region>Hyderabad</region>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><surname>Rao</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">Sreyas Institute of Engineering and Technology</orgName>
								<orgName type="institution" key="instit2">Nagole</orgName>
								<address>
									<settlement>Bandlaguda</settlement>
									<region>Hyderabad</region>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Sriramakavacham</forename><surname>Prudhviraj</surname></persName>
							<email>prudhvirajraj98@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">Sreyas Institute of Engineering and Technology</orgName>
								<orgName type="institution" key="instit2">Nagole</orgName>
								<address>
									<settlement>Bandlaguda</settlement>
									<region>Hyderabad</region>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Chennuri</forename><surname>Nagendra Sai</surname></persName>
							<email>nagendrasai.ch@sreyas.ac.in</email>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">Sreyas Institute of Engineering and Technology</orgName>
								<orgName type="institution" key="instit2">Nagole</orgName>
								<address>
									<settlement>Bandlaguda</settlement>
									<region>Hyderabad</region>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Intelligent and Secured Cloud Service Management Using Smart Data Hashing Algorithm</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">E00BD17351F4E1CD8ACBE5ADE143AD40</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:46+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Cloud Computing</term>
					<term>Security</term>
					<term>Smart Data Hashing Algorithm</term>
					<term>Duplication Free System</term>
					<term>SDHA</term>
					<term>Encryption</term>
					<term>Decryption</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The primary goal of this system is to provide a duplication-free cloud server with strong encryption and decryption information logical reasoning without the need of registration centers. With the fast growth of cloud computing, an increasing number of clients want to preserve their information in the cloud servers. New security issues must be addressed in order to assist more clients in processing their data on the public cloud. All clouds have particular space management issues, necessitating the development of a novel method in the proposed system that enables duplication-free data services in a cloud environment. Security is the primary restriction in a cloud computing environment, illustrating the necessity of avoiding third-party registration centers in a distant server-based data maintenance scheme. We follow the maximizing of security utility principle in our system by utilizing a strong Smart Data Hashing Algorithm (SDHA) that processes data using a 256-bit unbreakable encryption technique.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Cloud Computing enables on-demand access to cloud resources by integrating cloud computing into the mobile environment <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>. Cloud Computing has garnered considerable interest in recent years, both in business and academics. According to a recent research conducted by Heavy Reading, the Cloud Computing industry will produce over 68 billion dollars in direct revenue by the end of 2017. According to many sources such as ABI research, the global Cloud Computing user base has skyrocketed, the number of users has increased from 42.8 million in 2008-998 million by 2014. Cloud computing applications, infrastructures, and frameworks (such as Gmail, Facebook, and others) are increasingly being used by IT companies (like Google App Engine, Amazon web service etc.). Cloud computing <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref> is becoming more and more popular, both with IT pros and with everyday users. Global smartphone app use and development is also on the rise. Rapid development and implementation of various Cloud Computing services necessitate extensive security investigation. The following figure, Fig. <ref type="figure" target="#fig_0">1</ref> illustrates a distributed Cloud Computing architecture. To utilize a Cloud-Computing service, a mobile user MUi must first request the service using a mounted cellular application or internet browser. Following that' the user's mobile application or browser performs the data in the cloud and mobile user interface are authenticated with each other CSj. Both MUi and CSj must pass through a safe mutual authentication procedure that meets certain minimum standards. It includes compute competence, secrecy and session input defense among others to safeguard against a variety of threats sent across an unsecured channel. Cloud Computing services are intrinsically highly scattered and diverse. Thus, enrolling for each cloud service provider individually and keeping a distinct user account is a near-impossible effort. To be exact, MUi needs a single registered user account to access multiple cloud services from CSj. However, the standard two-party single-server authentication technique is incompatible with a multiple mobile device server scenario. SSO needs a single login and registration to access numerous Cloud Computing services. SSO involves three distinct parties: the network operator service as well as a verified identity supplier for mobile users. However, secret authentication may be performed with or without the involvement of an IdP/SCG/RC. Numerous ISPs and sites are now using 'Open-ID' to develop dispersed security solutions. Both the user and the service provider must register with the IdP in advance in this situation. An Open-ID is transmitted to the cloud service provider upon log in, who subsequently forwards it to the user authentication verification. This approach has two significant flaws. To begin, excessive IdP participation may become a bottleneck for the standard SSO system. Second, the OpenId approach necessitates the transmission of messages through an SSL-encrypted network connection. Regrettably, SSL-based methods have a significant computational cost due to the fact that security relies heavily on public-key-crypto-systems, like RSA, in order to secure communications <ref type="bibr" target="#b4">[5]</ref>. By looking at the fundamentals of two-factor authentication, Wang and Wang were able to identify the reasons why user privacy is so important. Developing a privacypreserving technique based only on lightweight cryptographic primitives like one-way hashing is difficult without public-key approaches, they highlighted. Cryptographic hash functions is almost impossible. Additionally, Wang and Wang demonstrated many security flaws in earlier user authentication techniques. They made three significant recommendations although analyze individual's authentication via: (a) preserving secrecy through the use of public-key approaches, (b) utilizing a fuzzy-verifier to strike a balance between usability and security, and (c) preventing privileged insider attacks through the use of secret keys. Wang'et-al., proposed a set of assessment criteria for building unnamed 2-factor user verification and discussed how to strike a balance between stability, usefulness and security. Huang-et.al., noted that developing password assisted verification systems with smartcard necessitates the development of detailed security models in addition to prescribed security research. Huang'et-al., suggested a general multi factor authentication technique that utilizes the consumer's secret-word, a smartcard and other related may successfully authenticate a user even if the distant server's connection is down <ref type="bibr" target="#b5">[6]</ref>. Ma et al. emphasized three design considerations for more resilient user verification solutions. Huang-et.al., examined a methodical method to client authentication employing three factors: a password, a smartcard and bio-metrics. The researchers suggested a generic and safe paradigm for transitioning from two-factor to three-factor authentication. It's worth noting but the renovation not only increased in turn declaration greatly at a minimal expenditure, other than preserved consumer isolation in circulated structure. This system proposed a novel authentication mechanism and combines simplicity, applicability, and robust concepts. Additionally, they offered an adversary model and set of criteria that may be used to assess existing as well as sequent 2-factor verification techniques. Additionally, Wang-et'al., noted that distinct attack scenarios, each of which may result in an authentication technique failing to achieve true two-factor security <ref type="bibr" target="#b6">[7]</ref>. Additionally, they performed a major relative assessment of twenty-six exemplary two-factor methods, with their findings highlighting the need for improved dimension when evaluating novel verification techniques.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Study</head><p>Academics and businesses are increasingly using Cloud-Mobile Augmentation (CMA) approaches. A cutting-edge mobile augmentation paradigm, CMA uses cloud computing resources to augment, enhance, and optimize the mobile device's computing capabilities for the purpose of running resource-intensive applications. Mobile devices that can do sophisticated computations and store vast quantities of data while leaving the smallest possible footprint and vulnerability are called enhanced mobile devices. Cloud computing resources (e.g., faraway clouds and nearby mobile nodes) are used by researchers to meet the different computing demands of mobile users. There is no one-size-fits-all solution to utilizing cloud computing resources.</p><p>It is difficult to adjust to CMA if you don't take into account the current state of the mobile client and distant resources, as well as the best cloud-based resource type. An in-depth analysis of mobile augmentation and a taxonomy for CMA approaches are presented in this study <ref type="bibr" target="#b7">[8]</ref>. Use of remote resources in augmentation methods will be demonstrated in this study, as well as issues related to the use of a range of cloud-based resources to enhance mobile devices. A taxonomy of augmentations is discussed, which includes both traditional and cloud-based augmentations. Our taxonomy is based on an in-depth review of current CMA approaches and four categories: distant fixed, proximal fixed, proximate mobile (and hybrid), and remote fixed. We provide an example of a decision-making flowchart for future CMA approaches and discuss how decision-making and performance constraints impact the adoption of CMA techniques. Mobile computing is discussed in the article, which cites open research questions as possible avenues for future study.</p><p>Cloud computing platforms like as Amazon Web Services, GoogleApp Engine, and Windows Azure have grown in popularity among IT businesses and developers in recent years. Simultaneously, we've witnessed a meteoric rise in the global adoption and deployment of smartphone platforms and apps. This article describes the present state of the art in the fusion of these two widely used technologies, dubbed Mobile Cloud Computing (MCC). We demonstrate how MCC may be used to a variety of sectors, including mobile learning, commerce, health/wellness, and social media. Additionally, we highlight research gaps related to important components of implementing and efficiently using MCC at scale. These improvements include increased resource allocation in the MCC environment through efficient task distribution and offloading, as well as increased security and privacy <ref type="bibr" target="#b8">[9]</ref>.</p><p>Users of the cloud may expect reliable, tailored, and quality service-assured computing environments thanks to the new paradigm of cloud computing. The cloud is a term used to describe a large, centralised data centre that houses applications and databases. Users may not be able to fully trust the cloud's stored data and computation results because of resource virtualization, global replication, and migration, and the lack of data and machines in the cloud. The vast majority of prior cloud security research has focused on protecting data stored in the cloud, rather than protecting data stored in the cloud itself. In this research, we introduce SecCloud, a privacy cheating deterrent and secure computation auditing system. Secure storage and computation auditing on the cloud have never been done before, but SecCloud makes this possible through the use of verifier signatures, batch verification and probabilistic sampling techniques. For the most cost-effective sample size, an in-depth analysis is offered. The SecHDFS cloud computing experimentation environment established in this paper is an important addition, since it serves as a test bed for SecCloud implementation. SecCloud's effectiveness and efficiency have been proven by additional testing results <ref type="bibr" target="#b9">[10]</ref>.</p><p>Using the Internet, cloud computing provides cost-effective, scalable, flexible, and powerful resources on demand. By maximizing and sharing resources, cloud computing substantially expands the capabilities of hardware. It's because of these reasons that organizations and individuals alike are moving their apps and services to the cloud, as outlined above. For example, power generation and distribution are moving to the cloud paradigm. There are additional security concerns when using cloud services provided by other parties. There are more security concerns in a shared environment with multiple users when user assets (data, applications, etc.) are moved outside of administrative control Cloud computing's fundamental nature raises security challenges, which are addressed in this paper. As an added bonus, the research also looks at recently published solutions to current security issues. In addition, a brief introduction of mobile cloud computing security challenges is presented. Lastly, there is a discussion of outstanding issues and future study fields <ref type="bibr" target="#b10">[11]</ref>. When it comes to patient data security and privacy, cloud-enabled wireless body area networks (WBANs) constitute a big threat to both. Most studies have focused on the typical scenario in which patients are kept inside. A more realistic usage of cloud-aided WBANs in m-healthcare social networks, where patients travel outdoors and WBANs are more vulnerable to sophisticated attacks, such as node compromise, is examined in this study.</p><p>For hierarchical and dispersed systems, we provide a safe and privacy-preserving key management technique that is resistant to both time-based and locational attacks. As a further security, it uses a blinding strategy to protect the patient's identity, sensor deployment and location, as well as Blom's symmetric key system with modified proactive secret sharing. Using the cloud server to do the computationally intensive privacy-preserving key material update decreases energy usage for energy-constrained WBANs dramatically. When it comes to mobile assault resistance, storage, computation, and communication overhead <ref type="bibr" target="#b11">[12]</ref>, our approach outperforms previous systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Methodology</head><p>Among the most popular cloud services is data storage. Cloud storage has immensely benefited cloud users since they can store large amounts of data without having to upgrade their equipment and access them from any location at any time. It's still possible to have issues with cloud storage services provided by Cloud-Cloud-Service-Providers. First and foremost, cloud-based data may necessitate a variety of security measures based on the sensitivity of the data. The data saved in the cloud includes sensitive personal information, data that is publicly published, data that is shared with a group, and so on. Providing sensitive information in a cloud environment is a big no-no since outsourced data might expose users' sensitive or even confidential material. The following are the limitations presented over the past cloud handling methodology, such as:</p><p>• Encrypted Data could incur much waste of cloud storage and complicate data sharing among authorized users. • We are still facing challenges on encrypted data storage and management with deduplication.</p><p>The following systems are emphasized more in the proposed development method, and they are described as follows: We need to manage and protect data security and privacy in order to save cloud storage across numerous third parties. Deduplication methods and secured data storage are essential in a variety of scenarios. Deduplication and access control are both supported by a Secure Minimal Remote User Authentication Scheme, which may be tailored to meet the needs of data owners in a variety of application situations. The data owners or other trusted parties, or both, may be able to regulate the sharing of their data in a flexible manner. Proposed schemes are supported by security analysis, and the SDHA security principles used to execute them are quite powerful. The following are the advantages presented over this methodology, such as:</p><p>• Flexible Cloud Data Deduplication with proper Access Control facilities • The proposed scheme is more secured, advanced and efficient.</p><p>• SDHA cryptography scheme is introduced to provide efficient and secured data storage over cloud environment.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Authorization and Authentication of Users</head><p>An important part of getting access to portals and apps is the User Authorization and Authentication module. Users (Data Owners and Data Users) may register and identify themselves in the system using relevant identifiers such as their Name, Mobile Number, E-Mail-Id, address, Username, and Password in this enhanced authentication and authorization standards module. A user's access to the application is provided when he or she has been through the necessary authentication and authorization processes. As part of the User Authorization and Authentication module, users may access three tiers of authentication services, including Password Generation, Password and Username, and Key Generation. It is through the authentication module that users enter the system and get access to its features. This is true for all users.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Maintenance of Secured and Encrypted Data</head><p>Protected as well as Encoded Data Processing allows the data owner to store data on a remote cloud server using proper authentication and security methods. The foundation for this module is the Smart Data Hashing Algorithm (SDHA), which is used to quickly handle the Encryption and Decryption processes, converting plain text to encrypted text and then maintaining the data on a distant server. Thus, no one can compromise the server or the data it contains. For all intents and purposes, the complete module of Secured and Encrypted Data Maintenance assists data owners in safely storing data in distant locations without fear.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Data Search for Authorized Parties</head><p>The Authorized Party Data Search module enables data users to conduct searches for records that have been saved on the server. The user must go through multiple levels of validation, including three-factor authentication, and must request the relevant data, which is then submitted to the server. The system generates a random master password for the customer and offers them to enter it on the portal after the request has been submitted. When a user enters a valid password, the server allows the user to download the information requested; if the password is invalid, the user is immediately prevented from doing so.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.">Scenario Regarding Page Ranking</head><p>Page Rank is a ranking algorithm that search engines employ to determine the order of the items in their search results. Page Rank is a metric used to determine the significance of online sites. According to Google, Page Rank is calculated by analyzing the quantity and quality of links to a page in order to assess the website's relative importance. The basic idea is that more authoritative websites will obtain a greater number of links from other authoritative websites.</p><p>It is not the only algorithm used by Google to organize search engine results, but it is the company's first and most well-known algorithm. The following algorithm illustrates the overall process flow of the proposed algorithm called Smart Data Hashing Algorithm (SDHA) in detail with proper specification.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5.">Smart Data Hashing Algorithm (SDHA)</head><p>Step-1: Acquire the Input Data File from the Data Owner.</p><p>Step-2: Receive the data in binary stream variable and process it with 256 bits per second accessibility.</p><p>Step-3: Identify the data value pairs for the input content.</p><p>Step-4: Check for special characters and maintain that into the separate entity computation. This step evolves the time saving capability to the algorithm and processes it in a faster manner.</p><p>Step-5: Assemble the data in proper manner with respect to value chunks and content capability.</p><p>Step-6: Estimate the data length with respect to the acquired content value pairs (manipulated over Step-5).</p><p>Step-7: For each chunk generate the iteration for manipulating the secret keys to hash the content in fine manner.</p><p>Step-8: Cross-validate the key structure based on the chunks and unpredictable formats in nature.</p><p>Step-9: Generate one random function using 'Random Number()' class in C# and to create a robust key with respect to the value ranges between 1000 and 9999.</p><p>Step-10: Acquire the random value in integer variable called 'Rnd'.</p><p>Step-11: Associate the generated random value 'Rnd' (Step-10) into the secret key to make it in unique way.</p><p>Step-12: The content is hashed in step by step manner based on the value chunks with respect to the key generated.</p><p>Step-13: Assemble the hashed content into the binary data stream object called 'obj'.</p><p>Step-14: Terminate the iteration created over step-7 and accumulate the overall values in one entity.</p><p>Step-15: Return the overall hashed content to the server and store it in a proper way.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Results and Discussions</head><p>This section briefly describes the results of the proposed approach and the algorithms are depicted with proper accuracy ratio.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion and Future Scope</head><p>Data de-duplication is essential in cloud environments, specifically when dealing with large amounts of information. When it comes to cloud data de-duplication and access control, we've suggested a heterogeneous storage management solution. The suggested method is flexible enough to accommodate a wide range of application situations and needs, and it provides costeffective large data storage management across several CSPs. An evaluation of our scheme's  </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: System Architectural View of Cloud Computing in Distributed Nature</figDesc><graphic coords="2,188.14,84.19,219.00,149.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Cloud Server Registration Model</figDesc><graphic coords="3,188.14,84.19,219.00,155.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: SDHA-based Cloud Handling Scheme -System Architectural View</figDesc><graphic coords="6,180.89,84.19,233.50,166.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>The proposed system algorithm called Smart Data Hashing Algorithm (SDHA) provides a clear security over cloud system and also provides multiple features in association with security norms. The overall implementation of the work is completed by using the powerful cloud management code development platform called Microsoft Visual Studio C#. The following figure, Fig.4 provides the performance evaluation of the proposed SDHA approach in clear manner and the performance metrics are cross-validated with conventional Merkle-B Cloud systems. Figures for Performance Evaluation of the Proposed Approach are given below:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Data Processing Time for the Proposed Approach</figDesc><graphic coords="8,191.39,371.56,212.50,150.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Cloud Service Selection for the Proposed Approach</figDesc><graphic coords="9,191.39,84.19,212.50,150.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Verification Ability of the Server for the Proposed Approach</figDesc><graphic coords="9,191.39,273.97,212.50,150.50" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Fastttps: fast approach for video transcoding time prediction and scheduling for http adaptive streaming videos</title>
		<author>
			<persName><forename type="first">P</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zabrovskiy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ilangovan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Timmerer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Prodan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cluster Computing</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="page" from="1605" to="1621" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Fspot: Fast and efficient video encoding workloads over amazon spot instances</title>
		<author>
			<persName><forename type="first">A</forename><surname>Zabrovskiy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kashansky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kersche</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Timmerer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Prodan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers, Materials and Continua</title>
		<imprint>
			<biblScope unit="volume">71</biblScope>
			<biblScope unit="page" from="5677" to="5697" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A dynamic evolutionary multi-objective virtual machine placement heuristic for cloud data centers</title>
		<author>
			<persName><forename type="first">E</forename><surname>Torre</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">J</forename><surname>Durillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>De Maio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Benedict</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Saurabh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Prodan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information and Software Technology</title>
		<imprint>
			<biblScope unit="volume">128</biblScope>
			<biblScope unit="page">106390</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">M3at: Monitoring agents assignment model for data-intensive applications</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kashansky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kimovski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Prodan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Marozzo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Iuhasz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Marozzo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Garcia-Blas</surname></persName>
		</author>
		<idno type="DOI">10.1109/PDP50117.2020.00018</idno>
	</analytic>
	<monogr>
		<title level="m">2020 28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="72" to="79" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A secure and efficient ecc-based user anonymity preserving single sign-on scheme for distributed computer networks</title>
		<author>
			<persName><forename type="first">V</forename><surname>Odelu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Das</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Goswami</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Security and Communication Networks</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="1732" to="1751" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A privacy-aware authentication scheme for distributed mobile cloud computing services</title>
		<author>
			<persName><forename type="first">J.-L</forename><surname>Tsai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N.-W</forename><surname>Lo</surname></persName>
		</author>
		<idno type="DOI">10.1109/JSYST.2014.2322973</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Systems Journal</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="805" to="815" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A secure biometrics-based multi-server authentication protocol using smart cards</title>
		<author>
			<persName><forename type="first">V</forename><surname>Odelu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Das</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Goswami</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on information forensics and Security</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="1953" to="1966" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges</title>
		<author>
			<persName><forename type="first">S</forename><surname>Abolfazli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Sanaei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Ahmed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Buyya</surname></persName>
		</author>
		<idno type="DOI">10.1109/SURV.2013.070813.00285</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Surveys &amp; Tutorials</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page" from="337" to="368" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Mobile cloud computing: A survey, state of art and future directions</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Rahimi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">H</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Vasilakos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Venkatasubramanian</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mobile Networks and Applications</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page" from="133" to="143" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Security and privacy for storage and computation in cloud computing</title>
		<author>
			<persName><forename type="first">L</forename><surname>Wei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Dong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Jia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Vasilakos</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ins.2013.04.028</idno>
		<ptr target="https://doi.org/10.1016/j.ins.2013.04.028" />
	</analytic>
	<monogr>
		<title level="j">Information Sciences</title>
		<imprint>
			<biblScope unit="volume">258</biblScope>
			<biblScope unit="page" from="371" to="386" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Security in cloud computing: Opportunities and challenges</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">U</forename><surname>Khan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Vasilakos</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ins.2015.01.025</idno>
		<ptr target="https://doi.org/10.1016/j.ins.2015.01.025" />
	</analytic>
	<monogr>
		<title level="j">Information Sciences</title>
		<imprint>
			<biblScope unit="volume">305</biblScope>
			<biblScope unit="page" from="357" to="383" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">4s: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks</title>
		<author>
			<persName><forename type="first">J</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Dong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Xiong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Vasilakos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Sciences</title>
		<imprint>
			<biblScope unit="volume">314</biblScope>
			<biblScope unit="page" from="255" to="276" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
