[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …
sources in the cloud during transit and processing. For instance, data provenance, which …
A comprehensive survey of cryptography key management systems
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …
security objectives, such as data confidentiality, authentication, and secure communication …
Towards DNA based data security in the cloud computing environment
Nowadays, data size is increasing day by day from gigabytes to terabytes or even petabytes,
mainly because of the evolution of a large amount of real-time data. Most of the big data is …
mainly because of the evolution of a large amount of real-time data. Most of the big data is …
A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure
S Namasudra - Computers and Electrical Engineering, 2022 - Elsevier
In this digital era, most of the data of an Internet of Things (IoT) infrastructure are
communicated over the internet and they are stored in a cloud environment. As there are …
communicated over the internet and they are stored in a cloud environment. As there are …
[HTML][HTML] A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions
With the rapid development of distributed system technologies, one of the biggest
challenges facing the digital world is ensuring the security of sensitive and confidential data …
challenges facing the digital world is ensuring the security of sensitive and confidential data …
A DNA based colour image encryption scheme using a convolutional autoencoder
With the advancement in technology, digital images can easily be transmitted and stored
over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting …
over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting …
Securing and managing healthcare data generated by intelligent blockchain systems on cloud networks through DNA cryptography
Purpose The purpose of this paper is to ensure the anonymity and security of health data
and improve the integrity and authenticity among patients, doctors and insurance providers …
and improve the integrity and authenticity among patients, doctors and insurance providers …
Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment
M Suganya, T Sasipraba - Journal of Cloud Computing, 2023 - Springer
With the increasing rise of distributed system technologies, one of the most pressing
problems facing the digital world is ensuring the security of sensitive and confidential data …
problems facing the digital world is ensuring the security of sensitive and confidential data …
Peer-to-peer user identity verification time optimization in iot blockchain network
Blockchain introduces challenges related to the reliability of user identity and identity
management systems; this includes detecting unfalsified identities linked to IoT applications …
management systems; this includes detecting unfalsified identities linked to IoT applications …
An efficient and secure model using adaptive optimal deep learning for task scheduling in cloud computing
Recently, cloud computing resources have become one of the trending technologies that
permit the user to manage diverse resources and a huge amount of data in the cloud. Task …
permit the user to manage diverse resources and a huge amount of data in the cloud. Task …