[HTML][HTML] Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN

L Golightly, P Modesti, R Garcia, V Chang - Cyber Security and Applications, 2023 - Elsevier
Access Control is a crucial defense mechanism organizations can deploy to meet modern
cybersecurity needs and legal compliance with data privacy. The aim is to prevent …

Blockchain-based federated learning technique for privacy preservation and security of smart electronic health records

M Guduri, C Chakraborty, U Maheswari… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This study introduces a blockchain-based lightweight encryption strategy with federated
learning to address the scalability and trust concerns of electronic health records (EHR) …

Semantic analysis of blockchain intelligence with proposed agenda for future issues

R Saxena, E Gayathri, L Surya Kumari - International Journal of System …, 2023 - Springer
Integrating blockchain technology with artificial intelligence (AI) ie, blockchain Intelligence
makes an extremely powerful tool that solves many multidimensional problems in several …

Smart contract-enabled secure sharing of health data for a mobile cloud-based e-health system

P Chinnasamy, A Albakri, M Khan, AA Raja, A Kiran… - Applied Sciences, 2023 - mdpi.com
Healthcare comprises the largest revenue and data boom markets. Sharing knowledge
about healthcare is crucial for research that can help healthcare providers and patients …

Machine learning and ontology-based novel semantic document indexing for information retrieval

A Sharma, S Kumar - Computers & Industrial Engineering, 2023 - Elsevier
The goal of information retrieval (IR) systems is to find the contents most closely related to
the user's information needs from a pool of information. However, conventional IR methods …

A security model to protect the isolation of medical data in the cloud using hybrid cryptography

S Gadde, J Amutharaj, S Usha - Journal of Information Security and …, 2023 - Elsevier
A cloud computing platform delivers a cost-efficient path for cloud users to store and access
data privately over remote storage via an Internet connection. Medical data is stored in the …

A K-SVD based compressive sensing method for visual chaotic image encryption

Z Xie, J Sun, Y Tang, X Tang, O Simpson, Y Sun - Mathematics, 2023 - mdpi.com
The visually secure image encryption scheme is an effective image encryption method,
which embeds an encrypted image into a visual image to realize a secure and secret image …

Multi-level security in healthcare by integrating lattice-based access control and blockchain-based smart contracts system

T Haritha, A Anitha - IEEE Access, 2023 - ieeexplore.ieee.org
Access control to patient information has become increasingly important in healthcare
systems. It is vital to enhance the security of healthcare systems to avoid data loss despite …

[HTML][HTML] IoT-driven blockchain to manage the healthcare supply chain and protect medical records

A Rizzardi, S Sicari, A Coen-Porisini - Future Generation Computer …, 2024 - Elsevier
Healthcare supply chain domain and medical records' management face numerous
challenges that come with new demands, such as customer dissatisfaction, rising healthcare …

Big data handling approach for unauthorized cloud computing access

A Razaque, N Shaldanbayeva, B Alotaibi, M Alotaibi… - Electronics, 2022 - mdpi.com
Nowadays, cloud computing is one of the important and rapidly growing services; its
capabilities and applications have been extended to various areas of life. Cloud computing …