References
- Abbas, G., Mehmood, A., Lloret, J., Raza, M. S., & Ibrahim, M. (2020). FIPA-based reference architecture for efficient discovery and selection of appropriate cloud service using cloud ontology. International Journal of Communication Systems, 33(14), e4504. https://doi.org/10.1002/DAC.4504
- Alkhalil, A., Sahandi, R., & John, D. (2017). An exploration of the determinants for decision to migrate existing resources to cloud computing using an integrated TOE-DOI model. Journal of Cloud Computing, 6(1), 1–20. https://doi.org/10.1186/S13677-016-0072-X
- Amara, M., & Siad, A. (2011). Elliptic curve cryptography and its applications. In International workshop on systems, signal processing and their applications, WOSSPA (pp. 247–250). IEEE. https://doi.org/10.1109/WOSSPA.2011.5931464
- Armstrong, D., Djemame, K., & Kavanagh, R. (2017). Towards energy aware cloud computing application construction. Journal of Cloud Computing, 6(1), 1–13.https://doi.org/10.1186/S13677-017-0083-2
- Awan, I. A., Shiraz, M., Hashmi, M. U., Shaheen, Q., Akhtar, R., & Ditta, A. (2020). Secure framework enhancing AES algorithm in cloud computing. Security and Communication Networks, 2020. https://doi.org/10.1155/2020/8863345
- Banyal, R. K., Jain, P., & Jain, V. K. (2013). Multi-factor authentication framework for cloud computing. In 2013 fifth international conference on computational intelligence, modelling and simulation (pp. 105–110). IEEE. https://doi.org/10.1109/CIMSIM.2013.25
- Basri, M., Mawengkang, H., & Zamzami, E. M. (2018). Cloud computing security model with combination of data encryption standard algorithm (DES) and least significant bit (LSB). In Journal of physics: Conference series (Vol. 970, No. 1, p. 012027). IOP Publishing. https://doi.org/10.1088/1742-6596/970/1/012027
- Bhardwaj, A., Subrahmanyam, G. V. B., Avasthi, V., & Sastry, H. (2016). Security algorithms for cloud computing. Procedia Computer Science, 85, 535–542. https://doi.org/10.1016/J.PROCS.2016.05.215
- Brindha, T., & Shaji, R. S. (2018). A secure transaction of cloud data using conditional source trust attributes encryption mechanism. Soft Computing, 22(3), 1013–1022. https://doi.org/10.1007/S00500-016-2405-6
- Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2013). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 25(1), 222–233. https://doi.org/10.1109/INFCOM.2011.5935306
- Dai, H., Ji, Y., Yang, G., Huang, H., & Yi, X. (2019). A privacy-preserving multi-keyword ranked search over encrypted data in hybrid clouds. IEEE Access, 8, 4895–4907.https://doi.org/10.1109/ACCESS.2019.2963096
- Dhiman, G., & Kumar, V. (2017). Spotted hyena optimizer: A novel bio-inspired based metaheuristic technique for engineering applications. Advances in Engineering Software, 114, 48–70. https://doi.org/10.1016/j.advengsoft.2017.05.014
- Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13(18), 1587–1611. https://doi.org/10.1002/wcm.1203
- Dizdarevic, J., Avdagic, Z., Orucevic, F., & Omanovic, S. (2021). Advanced consistency management of highly-distributed transactional database in a hybrid cloud environment using novel R-TBC/RTA approach. Journal of Cloud Computing, 10(1), 1–31. https://doi.org/10.1186/S13677-021-00230-0
- Fu, J. S., Liu, Y., Chao, H. C., Bhargava, B. K., & Zhang, Z. J. (2018). Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Transactions on Industrial Informatics, 14(10), 4519–4528. https://doi.org/10.1109/TII.2018.2793350
- Guo, J., Li, C., Zhang, G., Sun, Y., & Bie, R. (2020). Blockchain-enabled digital rights management for multimedia resources of online education. Multimedia Tools and Applications, 79(15), 9735–9755. https://doi.org/10.1007/S11042-019-08059-1
- Hsu, I. C., & Cheng, F. Q. (2015). SAaas: A cloud computing service model using semantic-based agent. Expert Systems, 32(1), 77–93. https://doi.org/10.1111/EXSY.12063
- Jennings, B., & Stadler, R. (2015). Resource management in clouds: Survey and research challenges. Journal of Network and Systems Management, 23(3), 567–619. https://doi.org/10.1007/s10922-014-9307-7
- Kang, H. S., Son, J. H., & Hong, C. S. (2015). Defense technique against spoofing attacks using reliable ARP table in cloud computing environment. In 2015 17th Asia-Pacific network operations and management symposium (APNOMS) (pp. 592–595). IEEE. https://doi.org/10.1109/APNOMS.2015.7275401
- Kumar, B. S., Geetha, M. P., Padmapriya, G., & Premkumar, M. (2020a). An approach for improving the labelling in a text corpora using sentiment analysis. Advances in Mathematics: Scientific Journal, 9(10), 8165–8174. https://doi.org/10.37418/AMSJ.9.10.46
- Kumar, C., Raj, T. D., Premkumar, M., & Raj, T. D. (2020b). A new stochastic slime mould optimization algorithm for the estimation of solar photovoltaic cell parameters. Optik, 223, 165277. https://doi.org/10.1016/j.ijleo.2020.165277
- Kumar, S., Jangir, P., Tejani, G. G., Premkumar, M., & Alhelou, H. H. (2021). MOPGO: A new physics-based multi-objective plasma generation optimizer for solving structural optimization problems. IEEE Access, 9, 84982–85016. https://doi.org/10.1109/ACCESS.2021.3087739
- Kumar, S., Kumar-Solanki, V., Choudhary, S. K., Selamat, A., & Gonzalez-Crespo, R. (2020c). Comparative study on ant colony optimization (ACO) and K-means clustering approaches for jobs scheduling and energy optimization model in internet of things (IoT). International Journal of Interactive Multimedia and Artificial Intelligence, 6(1), 107. https://doi.org/10.9781/ijimai.2020.01.003
- Kushida, T., & Pingali, G. S. (2014). Industry cloud-effective adoption of cloud computing for industry solutions. In 2014 IEEE 7th international conference on cloud computing (pp. 753–760). IEEE. https://doi.org/10.1109/CLOUD.2014.105
- Li, Z., Gui, Z., Hofer, B., Li, Y., Scheider, S., & Shekhar, S. (2020). Geospatial information processing technologies. In Manual of digital earth (pp. 191–227). Springer. https://doi.org/10.1007/978-981-32-9915-3_6
- Maha, M. A. (2020). Blockchain adoption opportunities in healthcare sector. International Journal of Engineering Trends and Technology, 68(10), 117–120.https://doi.org/10.14445/22315381/IJETT-V68I10P220
- Mämmelä, O., Majanen, M., Basmadjian, R., De Meer, H., Giesler, A., & Homberg, W. (2012). Energy-aware job scheduler for high-performance computing. Computer Science – Research and Development, 27(4), 265–275. https://doi.org/10.1007/s00450-011-0189-6
- Mastelic, T., Oleksiak, A., Claussen, H., Brandic, I., Pierson, J. M., & Vasilakos, A. V. (2014). Cloud computing: Survey on energy efficiency. ACM Computing Surveys, 47(2), 1–36. https://doi.org/10.1145/2656204
- Mohiuddin, I., Almogren, A., Al Qurishi, M., Hassan, M. M., Al Rassan, I., & Fortino, G. (2019). Secure distributed adaptive bin packing algorithm for cloud storage. Future Generation Computer Systems, 90, 307–316. https://doi.org/10.1016/J.FUTURE.2018.08.013
- Nalajala, S., Akhil, K., Sai, V., Shekhar, D. C., & Tumuluru, P. (2019). Light weight secure data sharing scheme for mobile cloud computing. In 2019 third international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC) (pp. 613–617). IEEE. https://doi.org/10.1109/I-SMAC47947.2019.9032618
- Narayanan, S. J., Soundrapandiyan, R., Perumal, B., & Baby, C. J. (2019). Emphysema medical image classification using fuzzy decision tree with fuzzy particle swarm optimization clustering. In Smart intelligent computing and applications (pp. 305–313). Springer. https://doi.org/10.1007/978-981-13-1921-1_31
- Nithya, S., & Uthariaraj, V. R. (2020). Identity-based public auditing scheme for cloud storage with strong key-exposure resilience. Security and Communication Networks, 2020, 1–13. https://doi.org/10.1155/2020/4838497
- Prabu Kanna, G., & Vasudevan, V. (2019). A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data. Cluster Computing, 22(4), 9561–9569.https://doi.org/10.1007/S10586-018-2723-9
- Premkumar, M., Babu, T. S., Umashankar, S., & Sowmya, R. (2020). A new metaphor-less algorithms for the photovoltaic cell parameter estimation. Optik, 208, 164559. https://doi.org/10.1016/j.ijleo.2020.164559
- Premkumar, M., Ibrahim, A. M., Kumar, R. M., & Sowmya, R. (2019a). Analysis and simulation of bio-inspired intelligent salp swarm MPPT method for the PV systems under partial shaded conditions. International Journal of Computing and Digital Systems, 8(5), 490–496. https://doi.org/10.12785/ijcds/080506
- Premkumar, M., Jangir, P., Kumar, B. S., Sowmya, R., Alhelou, H. H., Abualigah, L., Yildiz, A. R., & Mirjalili, S. (2021a). A new arithmetic optimization algorithm for solving real-world multiobjective CEC-2021 constrained optimization problems: Diversity analysis and validations. IEEE Access, 9, 84263–84295. https://doi.org/10.1109/ACCESS.2021.3085529
- Premkumar, M., Jangir, P., Ramakrishnan, C., Nalinipriya, G., Alhelou, H. H., & Kumar, B. S. (2021b). Identification of solar photovoltaic model parameters using an improved gradient-based optimization algorithm with chaotic drifts. IEEE Access, 9, 62347–62379. https://doi.org/10.1109/ACCESS.2021.3073821
- Premkumar, M., Jangir, P., & Sowmya, R. (2021c). MOGBO: A new multiobjective gradient-based optimizer for real-world structural optimization problems. Knowledge-Based Systems, 218, 106856. https://doi.org/10.1016/j.knosys.2021.106856
- Premkumar, M., Jangir, P., Sowmya, R., Elavarasan, R. M., & Kumar, B. S. (2021d). Enhanced chaotic JAYA algorithm for parameter estimation of photovoltaic cell/modules. ISA Transactions, 116, 139–166. https://doi.org/10.1016/j.isatra.2021.01.045
- Premkumar, M., Kumar, C., Sowmya, R., & Pradeep, J. (2021e). A novel salp swarm assisted hybrid maximum power point tracking algorithm for the solar photovoltaic power generation systems. Automatika: A Magazine for Automation, Measurement, Electronics, Computing and Communications, 62(1), 1–20. https://doi.org/10.1080/00051144.2020.1834062
- Premkumar, M., & Sowmya, R. (2017a). Design and implementation of context-aware adaptive routing for delay-tolerant mobile networks. International Journal of Electrical Communication Engineering, 3(2), 1–6. https://doi.org/10.37628/IJECE.V3I2.695
- Premkumar, M., & Sowmya, R. (2017b). Interactive content based image retrieval using multiuser feedback. JOIV: International Journal on Informatics Visualization, 1(4), 165–169. https://doi.org/10.30630/JOIV.1.4.57
- Premkumar, M., Sowmya, R., Jangir, P., Nisar, K. S., & Aldhaifallah, M. (2021f). A new metaheuristic optimization algorithm for brushless direct current wheel motor design problem. Computers, Materials and Continua, 67(2), 2227–2242. https://doi.org/10.32604/CMC.2021.015565
- Premkumar, M., Srikanth Babu, V., & Somwya, R. (2019b). Scheduling task to heterogeneous processors by modified ACO algorithm. In Soft computing in data analytics (pp. 565–576). Springer. https://doi.org/10.1007/978-981-13-0514-6_55
- Premkumar, M., & Sumithira, R. (2018). Humpback whale assisted hybrid maximum power point tracking algorithm for partially shaded solar photovoltaic systems. Journal of Power Electronics, 18(6), 1805–1818. https://doi.org/10.6113/JPE.2018.18.6.1805
- Rajkumar, S., Dutta, P., & Trivedi, A. (2018). Adaptive infrared images enhancement using fuzzy-based concepts. In Speech and language processing for human-machine communications (pp. 119–128). Springer. https://doi.org/10.1007/978-981-10-6626-9_13
- Rao, C. C. (2021). Enhanced effective and privacy preserving multi keyword search over encrypted data in cloud storage using blowfish algorithm. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(8), 31–39. https://doi.org/10.17762/TURCOMAT.V12I8.2740
- Reddy, M., & Babu, M. R. (2019). Implementing self adaptiveness in whale optimization for cluster head section in internet of things. Cluster Computing, 22(1), 1361–1372. https://doi.org/10.1007/s10586-017-1628-3
- Sundararaj, V. (2019). Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wireless Personal Communications, 104(1), 173–197.https://doi.org/10.1007/S11277-018-6014-9
- Thabit, F., Alhomdy, S., & Jagtap, S. (2021). A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions. International Journal of Intelligent Networks, 2, 18–33. https://doi.org/10.1016/J.IJIN.2021.03.001
- Wei, X., Fan, J., Lu, Z., & Ding, K. (2013). Application scheduling in mobile cloud computing with load balancing. Journal of Applied Mathematics, 2013. https://doi.org/10.1155/2013/409539
- Xu, F., Liu, F., Jin, H., & Vasilakos, A. V. (2013). Managing performance overhead of virtual machines in cloud computing: A survey, state of the art, and future directions. Proceedings of the IEEE, 102(1), 11–31. https://doi.org/10.1109/JPROC.2013.2287711
- Zhang, R., Sathishkumar, V. E., & Jackson Samuel, R. D. (2020). Fuzzy efficient energy smart home management system for renewable energy resources. Sustainability, 12(8), 3115. https://doi.org/10.3390/su12083115
- Zhang, X., Liu, C., Nepal, S., & Chen, J. (2013). An efficient quasi-identifier index-based approach for privacy preservation over incremental data sets on cloud. Journal of Computer and System Sciences, 79(5), 542–555. https://doi.org/10.1016/J.JCSS.2012.11.008
- Zhou, A., Wang, S., Hsu, C. H., Kim, M. H., & Wong, K. S. (2019). Virtual machine placement with (m, n)-fault tolerance in cloud data center. Cluster Computing, 22(5), 11619–11631. https://doi.org/10.1007/s10586-017-1426-y
- Zhou, Y., & Ding, G. (2018). Research of a pattern matching algorithm based on threshold and word frequency. In 2018 IEEE international conference on computer and communication engineering technology (CCET) (pp. 320–324). IEEE. https://doi.org/10.1109/CCET.2018.8542220