References
[1]. Aalpha. (n.d.). Retrieved from https://www.aalpha.net/blog/the-difference-between-paas-iaas-and-saas/
[2]. Agarwal, N., Rana, A., & Pandey, J. P. (2016, January).
Proxy signatures for secured data sharing. In 2016, 6th
International Conference-Cloud System and Big Data
Engineering (Confluence) (pp. 255-258). IEEE. https://doi.org/10.1109/CONFLUENCE.2016.7508124
[3]. Agarwal, N., Rana, A., Pandey, J. P., & Agarwal, A.
(2021). Secured sharing of data in cloud via dual
authentication, dynamic unidirectional PRE, and CPABE.
In Research Anthology on Artificial Intelligence
Applications in Security (pp. 504-527). IGI Global. https://doi.org/10.4018/IJISP.2020010104
[4]. Al-Dhuraibi, Y., Paraiso, F., Djarallah, N., & Merle, P.
(2017). Elasticity in cloud computing: State of the art and research challenges. IEEE Transactions on Services
Computing, 11(2), 430-447. https://doi.org/10.1109/TSC.2017.2711009
[5]. Bansal, N., Awasthi, A., & Bansal, S. (2016). Task
scheduling algorithms with multiple factor in cloud
computing environment. In Information Systems Design
and Intelligent Applications (pp. 619-627). Springer, New
Delhi. https://doi.org/10.1007/978-81-322-2755-7_64
[6]. Bansal, N., Maurya, A., Kumar, T., Singh, M., & Bansal,
S. (2015). Cost performance of QoS Driven task
scheduling in cloud computing. Procedia Computer
Science, 57, 126-130. https://doi.org/10.1016/j.procs.2015.07.384
[7]. Basu, S., & Sathyaraj, R. (2017). Cloud Computing
and Big Data for Genomics: A Review. International
Journal of Advanced Research in Computer Science,
8(3), 728–731.
[8]. Bhat, A. Z., Naidu, V. R., & Singh, B. (2019). Multimedia
cloud for higher education establishments: a reflection. In
Emerging Trends in Expert Applications and Security (pp.
691-698). Springer, Singapore. https://doi.org/10.1007/978-981-13-2285-3_81
[9]. Coutinho, E. F., Rego, P. A., Gomes, D. G., & de Souza,
J. N. (2016). Physics and microeconomics-based metrics
for evaluating cloud computing elasticity. Journal of
Network and Computer Applications, 63, 159-172.
https://doi.org/10.1016/j.jnca.2016.01.015
[10]. Garg, S., Dwivedi, R. K., & Chauhan, H. (2016,
September). Efficient utilization of virtual machines in
cloud computing using Synchronized Throttled Load
Balancing. In 2015, 1st International Conference on Next
Generation Computing Technologies (NGCT) (pp. 77-80).
IEEE. https://doi.org/10.1109/NGCT.2015.7375086
[11]. Moldovan, D., Copil, G., Truong, H. L., & Dustdar, S.
(2015). MELA: elasticity analytics for cloud services.
International Journal of Big Data Intelligence, 2(1), 45-62.
https://doi.org/10.1504/ijbdi.2015.067569
[12]. Moudjari, R., Sahnoun, Z., & Belala, F. (2018).
Towards a fuzzy bigraphical multi agent system for cloud
of clouds elasticity management. International Journal of
Approximate Reasoning, 102, 86-107. https://doi.org/10.1016/j.ijar.2018.07.012
[13]. Ouyang, S., & Fang, Y. (2022). Enterprise Financial
and Tax Risk Management Methods under the
Background of Big Data. Mathematical Problems in
Engineering. https://doi.org/10.1155/2022/5831866
[14]. Tyagi, N., & Rana, A. (2015). Fuel your growth with
integration: Hybrid cloud computing. Global Journal of
Computer Science and Technology, 15(2).
[15]. Tyagi, N., Rana, A., & Kansal, V. (2019, February).
Creating elasticity with enhanced weighted optimization
load balancing algorithm in cloud computing. In 2019,
Amity International Conference on Artificial Intelligence
(AICAI) (pp. 600-604). IEEE. https://doi.org/10.1109/ AICAI.2019.8701375
[16]. Sharma, P., Berwal, Y. P. S., & Ghai, W. (2019a).
Enhancement of plant disease detection framework
using cloud computing and GPU computing. International
Journal of Engineering and Advanced Technology (IJEAT),
9(1), 3139-3141. https://doi.org/10.35940/ijeat.A9541.109119
[17]. Sharma, P., Berwal, Y. S., & Ghai, W. (2019b).
Krishimitr: A cloud computing and platform for disease
detection in agriculture. The International Journal of
Innovative Technology and Exploring Engineering (IJITEE),
8(12), 2967-2970. https://doi.org/10.35940/ijitee.K1955.1081219
[18]. Singh, G., & Garg, S. (2020, June). Fuzzy elliptic
curve cryptography based cipher text policy attribute
based encryption for cloud security. In 2020, International
Conference on Intelligent Engineering and Management
(ICIEM) (pp. 327-330). IEEE. https://doi.org/10.1109/ICIEM48762.2020.9159961