[HTML][HTML] A review on secure data deduplication: Cloud storage security issue

P Prajapati, P Shah - Journal of King Saud University-Computer and …, 2022 - Elsevier
Cloud storage service providers caters to the need of organizations and individuals by
allowing them to store, transfer and backup their ever-increasing amount of data at low cost …

A review of various challenges in cybersecurity using artificial intelligence

H Chaudhary, A Detroja, P Prajapati… - 2020 3rd international …, 2020 - ieeexplore.ieee.org
Cybersecurity using Artificial Intelligence is a double-edged sword, it can improve security
substantially but it also creates a possibility of new forms of attack, which performed on …

Redundancy elimination in IoT oriented big data: a survey, schemes, open challenges and future applications

R Rani, N Kumar, M Khurana - Cluster Computing, 2024 - Springer
Abstract The Internet of Things (IoT), an enlarged Internet-based network, is a key element of
the next information technology revolution. With the evolution of numerous IoT based smart …

A review on recent intrusion detection systems and intrusion prevention systems in IoT

P Prajapati, B Bhatt, G Zalavadiya… - … on Cloud Computing …, 2021 - ieeexplore.ieee.org
IoT Security is the prime region prone to security malfunctioning. IoT includes the set-up of
different incorporated physical as well as virtual devices that are accessible over the …

[HTML][HTML] Provable data possession using additive homomorphic encryption

P Shah, P Prajapati - Journal of King Saud University-Computer and …, 2022 - Elsevier
Efficiency, public verification, and robustness are essential characteristics of data
possession schemes. The efficiency of such kinds of Provable Data Possession (PDP) …

[PDF][PDF] A review of recent detection methods for http ddos attacks

P Prajapati, N Patel, P Shah - International Journal of Scientific, 2019 - researchgate.net
There has been a tremendous increase in dependency on web technologies alongside
which its disruption attempts have also increased. Web servers that run on Hypertext …

A review of recent trends on DNA based cryptography

G Bhoi, R Bhavsar, P Prajapati… - 2020 3rd International …, 2020 - ieeexplore.ieee.org
One of the emerging methodologies nowadays in the field of cryptography based on human
DNA sequences. As the research says that even a limited quantity of DNA can store gigantic …

Privacy Challenges and Solutions in Implementing Searchable Encryption for Cloud Storage

A Patel, P Prajapati, P Shah, V Sangani… - … on Information and …, 2023 - Springer
With the instantaneous growth of cloud usage, IoT devices, smart cities, 4G communication,
augmented reality, and virtual reality the requirement for digital storage has also risen to …

Identity-Based Encryption (IBE)-Based Improved Data Possession Techniques

P Shah, P Prajapati - International Conference on ICT for Sustainable …, 2023 - Springer
Asymmetric key cryptography is used by Provable Data Possession (PDP) schemes to
confirm the accuracy of files that are stored remotely. The size and authenticity of the public …

Artificial Intelligence Models for Cyber Security

R Swathika, K Geetha - Leveraging Artificial Intelligence (AI) …, 2024 - taylorfrancis.com
Today's trend of digital transformation greatly improves our lifestyle and simplifies every task.
However, as technology becomes more advanced, security becomes a concern. Artificial …