[PDF][PDF] New Efficient Cryptographic Techniques For Cloud Computing Security

M Kaleem, MA Mushtaq, U Jamil, SA Ramay… - Migration …, 2024 - researchgate.net
The exponential expansion of Cloud computing has resulted in a solution revolution within
data storage and employ, but it has also increased security concerns. Typically, traditional …

Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing

K Sasikumar, S Nagarajan - IEEE Access, 2024 - ieeexplore.ieee.org
Cloud computing is a fast-growing industry that offers various online services, including
software, computing resources, and databases. Its payment model is usage-based, whereas …

Dynamic AES Encryption and Blockchain Key Management: A Novel Solution for Cloud Data Security

MY Shakor, MI Khaleel, M Safran, S Alfarhood… - IEEE …, 2024 - ieeexplore.ieee.org
In the rapidly evolving realm of cloud computing security, this paper introduces an innovative
solution to address persistent challenges. The proliferation of cloud technology has brought …

A hybrid algorithm-based optimization protocol to ensure data security in the cloud

S Zubair, HMA Ahmed - International Journal of Information Technology, 2024 - Springer
Cloud computing security involves the procedures, technologies, and policies that protect
data, applications, and resources in cloud computing environments. As communities …

[PDF][PDF] Blood Cells Cancer Detection Based on Deep Learning

AJ Abougarair, M Alshaibi, AK Alarbish… - Journal of Advances …, 2024 - researchgate.net
Acute Lymphocytic Leukemia (ALL) is a form of cancer characterized by the abnormal
production of white blood cells in the bone marrow. These cells do not function properly …

Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks

S Pandey, B Bhushan - Wireless Networks, 2024 - Springer
In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices
and improve the overall Quality of Life (QoL) for people. The main concern among IoT …

A fast verifiable fully homomorphic encryption technique for secret computation on cloud data

GK Mahato, SK Chakraborty - International Journal of Information …, 2024 - Springer
In the domain of cloud computing, safeguarding the confidentiality and integrity of
outsourced sensitive data during computational processes is of utmost importance. This …

PRC6: Hybrid lightweight cipher for enhanced cloud data security in parallel environment

ZA Mohammed, KA Hussein - Security and Privacy, 2024 - Wiley Online Library
Modern technologies of computing cloud are showing great promise, but at the same time
create new security challenges that hinder full acceptance. Given that most of these services …

Improved encryption and obfuscation process of lightweight secured auditable cloud storage with data dynamics

P Singh, P Singh, AK Agarwal - Multimedia Tools and Applications, 2024 - Springer
In order to safeguard the cloud-based applications, systems, and user access related to
them, several technological solutions, policies, and processes are put forward, termed cloud …

SOSO: Symbiotic Organisms Search Optimization based Faster RCNN for Secure Data Storage in Cloud

J Thresa Jeniffer, A Chandrasekar… - IETE Journal of …, 2024 - Taylor & Francis
Because of the Internet of Things (IoT) and wearable devices, information obtained is
subject to cyber attacks, making intrusion detection an essential component. The increased …