[HTML][HTML] Edge intelligence secure frameworks: Current state and future challenges

E Villar-Rodriguez, MA Pérez, AI Torre-Bastida… - Computers & …, 2023 - Elsevier
At the confluence of two great paradigms such as Edge Computing and Artificial Intelligence,
Edge Intelligence arises. This new concept is about the smart exploitation of Edge …

Privacy-preservation techniques for IoT devices: a systematic mapping study

D Torre, A Chennamaneni, A Rodriguez - IEEE Access, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life.
The objective of IoT is to provide ubiquitous access to numerous devices and machines on …

Hybrid cryptographic approach to enhance the mode of key management system in cloud environment

S Ahmad, S Mehfuz, J Beg - The Journal of Supercomputing, 2023 - Springer
Cloud computing has gained great attention among the individual user and the organization.
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …

Hybrid AES-ECC model for the security of data over cloud storage

S Rehman, N Talat Bajwa, MA Shah, AO Aseeri… - Electronics, 2021 - mdpi.com
A cloud computing environment provides a cost-effective way for the end user to store and
access private data over remote storage using some Internet connection. The user has …

Enhanced cloud storage encryption standard for security in distributed environments

S Kautish, S Juneja, K Mohiuddin, FK Karim… - Electronics, 2023 - mdpi.com
With the growing number of cloud users, shared data auditing is becoming increasingly
important. However, these schemes have issues with the certificate management. Although …

Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes

S Ali, F Anwer - International Journal of Information Technology, 2024 - Springer
IoTs are increasingly gaining popularity and prevalence due to their extensive applications
across various domains. They gather data from the real environment and transmit it through …

Block chain enabled auditing with optimal multi‐key homomorphic encryption technique for public cloud computing environment

VNR Bandaru, P Visalakshi - Concurrency and Computation …, 2022 - Wiley Online Library
Cloud storage is a significant cloud computing (CC) service which enables the client to save
and retrieve the data at anytime and anywhere. Due to the increased demand and familiarity …

Hybrid AES-Modified ECC Algorithm for Improved Data Security over Cloud Storage

S Jagadeesh, SM Ali, SPG Selvan… - … in Applied Sciences …, 2023 - semarakilmu.com.my
As cloud computing has been increasingly used by businesses to address their data storage
and processing needs. The private data can be stored and retrieved by the end user through …

[PDF][PDF] The development of models of an analytical data processing system for monitoring information security of an informatization object using cloud infrastructure

VA Sizov, AD Kirov - Russian Technological Journal, 2021 - rtj-mirea.ru
The article is devoted to the problem of developing an analytical data processing system
(ADPS) for monitoring information security within the information security management …

RSA and Elliptic Curve Encryption System: A Systematic Literature Review

M Ugbedeojo, MO Adebiyi, OJ Aroba… - International Journal of …, 2024 - igi-global.com
Almost every living species has a motive to communicate electronically with one another
and preserve data for immediate or future use. These data are becoming too large to be …