ECM: Enhanced confidentiality method to ensure the secure migration of data in VM to cloud environment
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.3.53Keywords:
Data migration, Data authentication, Authenticity, Data integrity, Cloud security, Hashing.cDimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Abstract
How to Cite
Downloads
Similar Articles
- Raja Pathak, Shweta Kumari, An investigation on the impact of vedic mathematics on higher secondary school student’s ability to expand mathematical units , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- R Prabhu, S Sathya, P Umaeswari, K Saranya, Lung cancer disease identification using hybrid models , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Raghavan Santhanam, P Venugopal, Sreoshi Dasgupta, R. S. Kumar, Saravanan M.P, Ravindra A. Kayande, Analysis of organizational culture and e-commerce adoption in the context of top management perspectives , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- A. Jabeen, A. R. M. Shanavas, Hazard regressive multipoint elitist spiral search optimization for resource efficient task scheduling in cloud computing , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Farheen Najma B, Faseeha Begum, Resistance to digital banking by senior citizens in India - A review , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Kapil ahuja, Ekta Rani, Soniya Devi, Exploring the dynamic landscape of environmental, social, and governance literature by using bibliometric analysis , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- K. Arunkumar, K. R. Shanthy, S. Lakshmisridevi, K. Thilagam, FR-CNN: The optimal method for slicing fifth-generation networks through the application of deep learning , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- S. Gomathi, C. Radhika, A secure messaging application using steganography and AES encryption a dual-layer secure messaging system , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Aman Bora, Ajay Kumar, Akhilesh Dwivedi, Exploring effective methods of conflict resolution: Strategies and challenges for sustainable peace , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- A. Sandanasamy, P. Joseph Charles, Distributed SDN control for IoT networks: A federated meta reinforcement learning solution for load balancing , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
<< < 10 11 12 13 14 15 16 17 18 19 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Raja Selvaraj, Manikandasaran S. Sundari, EAM: Enhanced authentication method to ensure the authenticity and integrity of the data in VM migration to the cloud environment , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper

