Buchade, Amar; Ingle, Rajesh - In: International Journal of Rough Sets and Data Analysis … 5 (2018) 3, pp. 21-41
The protection of the key is important due to the vulnerabilities which exist in cloud computing. In this article, algorithms and techniques for protection of the key in cloud computing are proposed. The algorithms to select the number of virtual machines is presented to protect the key. The...