Ravi Shankar Saxena, Smaranika Mohapatra, Amit Kumar Singh, Bhupati Bhupati, Juan Carlos Cotrina-Aliaga, José Luis Arias-Gonzáles, Sarvesh Kumar
{"title":"云计算中使用认证密钥的以机器学习(ML)为中心的资源安全","authors":"Ravi Shankar Saxena, Smaranika Mohapatra, Amit Kumar Singh, Bhupati Bhupati, Juan Carlos Cotrina-Aliaga, José Luis Arias-Gonzáles, Sarvesh Kumar","doi":"10.47974/jdmsc-1768","DOIUrl":null,"url":null,"abstract":"The computing is the on-request transportation of registering contributions over the web to give speedier advancement, bendy assets, and economies of scale. Administrations incorporate servers, stockpiling, data sets, systems administration, programming, and examination. The routine security tasks that the providers carry out include protecting the basic system, reaching, maintaining, and setting up the actual has and organization, on which the strategy illustrations run, as well as the capacity and unique possessions.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Machine Learning (ML)–centric resource security in cloud computing using authenticated key\",\"authors\":\"Ravi Shankar Saxena, Smaranika Mohapatra, Amit Kumar Singh, Bhupati Bhupati, Juan Carlos Cotrina-Aliaga, José Luis Arias-Gonzáles, Sarvesh Kumar\",\"doi\":\"10.47974/jdmsc-1768\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The computing is the on-request transportation of registering contributions over the web to give speedier advancement, bendy assets, and economies of scale. Administrations incorporate servers, stockpiling, data sets, systems administration, programming, and examination. The routine security tasks that the providers carry out include protecting the basic system, reaching, maintaining, and setting up the actual has and organization, on which the strategy illustrations run, as well as the capacity and unique possessions.\",\"PeriodicalId\":193977,\"journal\":{\"name\":\"Journal of Discrete Mathematical Sciences and Cryptography\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Discrete Mathematical Sciences and Cryptography\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47974/jdmsc-1768\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Discrete Mathematical Sciences and Cryptography","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47974/jdmsc-1768","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Machine Learning (ML)–centric resource security in cloud computing using authenticated key
The computing is the on-request transportation of registering contributions over the web to give speedier advancement, bendy assets, and economies of scale. Administrations incorporate servers, stockpiling, data sets, systems administration, programming, and examination. The routine security tasks that the providers carry out include protecting the basic system, reaching, maintaining, and setting up the actual has and organization, on which the strategy illustrations run, as well as the capacity and unique possessions.