Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud

K Sundar, S Sasikumar, C Jayakumar - Quantum Information Processing, 2022 - Springer
In today's scenario of computing paradigm, the cloud framework has become a significant
solution on peak of virtualization for the utilization of computing models. However, the model …

Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing

K Sundar, S Sasikumar, C Jayakumar… - Multimedia Tools and …, 2023 - Springer
In recent days, cloud computing is a universal computing and conventional paradigm, in
which the resources are provided over the Internet based on requirements. With the huge …

An empirical study for mitigating sustainable cloud computing challenges using ISM-ANN

HS Alwageed, I Keshta, RA Khan, A Alzahrani… - PloS one, 2024 - journals.plos.org
The significance of cloud computing methods in everyday life is growing as a result of the
exponential advancement and refinement of artificial technology. As cloud computing makes …

[PDF][PDF] IBLIND Quantum Computing and HASBE for Secure Cloud Data Storage and Accessing.

KK Singamaneni, PS Naidu - Rev. d'Intelligence Artif., 2019 - researchgate.net
Accepted: 13 January 2019 Cloud computing is a universal conventional system. With the
exponential development of cloud data and storage room, cloud security has turned out to …

Achieving fine-grained access control and mitigating role explosion by utilising ABE with RBAC

B Balusamy, S Ramachandran… - International Journal of …, 2017 - inderscienceonline.com
Cloud systems can store a vast amount of sensitive data whose access must be well
regulated. A good access control policy ensures the security of this data while providing high …

Visual vocabulary tree-based partial-duplicate image retrieval for coverless image steganography

Y Mu, Z Zhou - International Journal of High Performance …, 2019 - inderscienceonline.com
The traditional image steganographic approaches embed the secret message into covers by
modifying their contents. Therefore, the modification traces left in the cover will cause some …

Term extraction and correlation analysis based on massive scientific and technical literature

W Zeng, H Xu, J Zhang - International Journal of …, 2017 - inderscienceonline.com
Scientific and technical term is the basic unit of knowledge discovery and organisation
construction. Correlation analysis is one of the important technologies for the deep data …

HB-PPAC: hierarchy-based privacy preserving access control technique in public cloud

S Senthilkumar… - International Journal of …, 2017 - inderscienceonline.com
Cloud computing is one term that has evolved drastically over the years. It involves
deploying groups of remote servers and software that are networked, that will allow …

An Investigation of Operative Data Safety and Authentication Schemes for Benign Cloud Environments

WA Khan, K Ateeq, K Amjad - 2023 International Conference …, 2023 - ieeexplore.ieee.org
The term" cloud computing" refers to a new computing architecture in which data is stored
and processed over the Internet and accessed by anybody or any organisation. That makes …

A privacy preserving and fine-grained access control scheme in DaaS based on efficient DSP re-encryption

J Yang, L Wang, J Baek - International Journal of High …, 2018 - inderscienceonline.com
Database as a service (DaaS) is an important cloud service, and preserving privacy is one of
the most crucial needs in DaaS. To achieve more efficient and safer preservation of privacy …