Machine Learning (ML)–centric resource security in cloud computing using authenticated key
-
Published:2023
Issue:5
Volume:26
Page:1427-1436
-
ISSN:0972-0529
-
Container-title:Journal of Discrete Mathematical Sciences and Cryptography
-
language:
-
Short-container-title:JDMSC
Author:
Saxena Ravi Shankar,Mohapatra Smaranika,Singh Amit Kumar,Bhupati Bhupati,Cotrina-Aliaga Juan Carlos,Arias-Gonzáles José Luis,Kumar Sarvesh
Abstract
The computing is the on-request transportation of registering contributions over the web to give speedier advancement, bendy assets, and economies of scale. Administrations incorporate servers, stockpiling, data sets, systems administration, programming, and examination. The routine security tasks that the providers carry out include protecting the basic system, reaching, maintaining, and setting up the actual has and organization, on which the strategy illustrations run, as well as the capacity and unique possessions.
Publisher
Taru Publications
Subject
Applied Mathematics,Algebra and Number Theory,Analysis