[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

OI Abiodun, M Alawida, AE Omolara… - Journal of King Saud …, 2022 - Elsevier
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …

A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

Towards DNA based data security in the cloud computing environment

S Namasudra, D Devi, S Kadry, R Sundarasekar… - Computer …, 2020 - Elsevier
Nowadays, data size is increasing day by day from gigabytes to terabytes or even petabytes,
mainly because of the evolution of a large amount of real-time data. Most of the big data is …

A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure

S Namasudra - Computers and Electrical Engineering, 2022 - Elsevier
In this digital era, most of the data of an Internet of Things (IoT) infrastructure are
communicated over the internet and they are stored in a cloud environment. As there are …

[HTML][HTML] A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions

F Thabit, S Alhomdy, S Jagtap - International Journal of Intelligent Networks, 2021 - Elsevier
With the rapid development of distributed system technologies, one of the biggest
challenges facing the digital world is ensuring the security of sensitive and confidential data …

A DNA based colour image encryption scheme using a convolutional autoencoder

F Ahmed, MU Rehman, J Ahmad, MS Khan… - ACM Transactions on …, 2023 - dl.acm.org
With the advancement in technology, digital images can easily be transmitted and stored
over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting …

Securing and managing healthcare data generated by intelligent blockchain systems on cloud networks through DNA cryptography

H Kaur, R Jameel, MA Alam, B Alankar… - Journal of Enterprise …, 2023 - emerald.com
Purpose The purpose of this paper is to ensure the anonymity and security of health data
and improve the integrity and authenticity among patients, doctors and insurance providers …

Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment

M Suganya, T Sasipraba - Journal of Cloud Computing, 2023 - Springer
With the increasing rise of distributed system technologies, one of the most pressing
problems facing the digital world is ensuring the security of sensitive and confidential data …

Peer-to-peer user identity verification time optimization in iot blockchain network

AR Kairaldeen, NF Abdullah, A Abu-Samah, R Nordin - Sensors, 2023 - mdpi.com
Blockchain introduces challenges related to the reliability of user identity and identity
management systems; this includes detecting unfalsified identities linked to IoT applications …

An efficient and secure model using adaptive optimal deep learning for task scheduling in cloud computing

S Badri, DM Alghazzawi, SH Hasan, F Alfayez… - Electronics, 2023 - mdpi.com
Recently, cloud computing resources have become one of the trending technologies that
permit the user to manage diverse resources and a huge amount of data in the cloud. Task …