ECM: Enhanced confidentiality method to ensure the secure migration of data in VM to cloud environment
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.3.53Keywords:
Data migration, Data authentication, Authenticity, Data integrity, Cloud security, Hashing.cDimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Abstract
How to Cite
Downloads
Similar Articles
- S. Vanaja, Hari Ganesh S, Application of data mining and machine learning approaches in the prediction of heart disease – A literature survey , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Swetha Rajkumar, Jayaprasanth Devakumar, LSTM based data driven fault detection and isolation in small modular reactors , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- G. Chitra, Hari Ganesh S., Cultural algorithm based principal component analysis (CA-PCA) approach for handling high dimensional data , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Nilesh M. Patil, P M. Krishna, G. Deena, C Harini, R.K. Gnanamurthy, Romala V. Srinivas, Exploring real-time patient monitoring and data analytics with IoT-based smart healthcare monitoring , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Amanda Q. Okronipa, Jones Y. Nyame, Adoption of health information systems in emerging economies: Evidence from Ghana , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- G. Vijayalakshmi, M. V. Srinath, Student’s Academic Performance Improvement Using Adaptive Ensemble Learning Method , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- Avdhesh Kumar, Manoj Agarwal, Studies on challenges and opportunities for foreign direct investment in the automobile industry in India , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Naveena Somasundaram, Vigneshkumar M, Sanjay R. Pawar, M. Amutha, Balu S, Priya V, AI-driven material design for tissue engineering a comprehensive approach integrating generative adversarial networks and high-throughput experimentation , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- C. Muruganandam, V. Maniraj, A Self-driven dual reinforcement model with meta heuristic framework to conquer the iot based clustering to enhance agriculture production , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- L. Amudavalli, K. Muthuramalingam, Energy-efficient location-based routing protocol for wireless sensor networks using teaching-learning soccer league optimization (TLSLO) , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
<< < 5 6 7 8 9 10 11 12 13 14 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Raja Selvaraj, Manikandasaran S. Sundari, EAM: Enhanced authentication method to ensure the authenticity and integrity of the data in VM migration to the cloud environment , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper

