Privacy-Preserving Data in IoT-based Cloud Systems: A Comprehensive Survey with AI Integration
As the integration of Internet of Things devices with cloud computing proliferates, the
paramount importance of privacy preservation comes to the forefront. This survey paper …
paramount importance of privacy preservation comes to the forefront. This survey paper …
[HTML][HTML] An integrated deep learning and natural language processing approach for continuous remote monitoring in digital health
KA Shastry, A Shastry - Decision Analytics Journal, 2023 - Elsevier
The rapid adoption of digital health technologies generates a vast amount of health data,
presenting an opportunity to leverage advanced data analytics and cognitive computing to …
presenting an opportunity to leverage advanced data analytics and cognitive computing to …
Explainable AI in Healthcare Application
Given the inherent risks in medical decision-making, medical professionals carefully
evaluate a patient's symptoms before arriving at a plausible diagnosis. For AI to be widely …
evaluate a patient's symptoms before arriving at a plausible diagnosis. For AI to be widely …
EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems
Y Chen, G Dong, C Xu, Y Hao, Y Zhao - Sensors, 2023 - mdpi.com
In this paper, we propose a user-friendly encrypted storage scheme named EStore, which is
based on the Hadoop distributed file system. Users can make use of cloud-based distributed …
based on the Hadoop distributed file system. Users can make use of cloud-based distributed …
[HTML][HTML] S-zac: Hardening access control of service mesh using intel sgx for zero trust in cloud
In cloud services, the zero-trust security paradigm has emerged as a key strategy to reduce
the large attack surface created by the complexity of cloud systems. Service mesh is a …
the large attack surface created by the complexity of cloud systems. Service mesh is a …
A revocable attribute-based access control with non-monotonic access structure
Abstract Internet of Things (IoT) has revolutionized data manipulation across various
applications, particularly in online healthcare paradigm, where medical data are collected …
applications, particularly in online healthcare paradigm, where medical data are collected …
Provably secure data selective sharing scheme with cloud-based decentralized trust management systems
The smart collection and sharing of data is an important part of cloud-based systems, since
huge amounts of data are being created all the time. This feature allows users to distribute …
huge amounts of data are being created all the time. This feature allows users to distribute …
Chebyshev chaotic map with attribute based encryption on session based data-sharing in fog environment
T GA, SMS Bhanu - Peer-to-Peer Networking and Applications, 2025 - Springer
Fog computing offers a viable solution to the overwhelming demands placed on cloud-
based medical data processing, addressing issues related to low latency, storage, and …
based medical data processing, addressing issues related to low latency, storage, and …
Privacy-Preserving Attribute-Based Access Control with Non-Monotonic Access Structure
M Ashouri-Talouki, N Kahani… - 2023 7th Cyber Security …, 2023 - ieeexplore.ieee.org
Attribute-Based Encryption (ABE) with non-monotonic access policies provides fine-grained
access control for widespread applications like Cloud-assisted HealthIoT systems. In this …
access control for widespread applications like Cloud-assisted HealthIoT systems. In this …
Proposing a Model to Enhance the IoMT-Based EHR Storage System Security
Abstract The Internet of Medical Things (IoMT) and Electronic Health Records (EHR) are
core aspects of today's healthcare facilities, hence these technologies and storage platforms …
core aspects of today's healthcare facilities, hence these technologies and storage platforms …