HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud

P Chinnasamy, P Deepalakshmi - Journal of Ambient Intelligence and …, 2022 - Springer
Technology that is perfect is free of vulnerability. Technological growth offers users online
data storage and access to it from anywhere. Cloud computing is a model that provides data …

Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN)

E Balamurugan, A Mehbodniya, E Kariri, K Yadav… - Pattern recognition …, 2022 - Elsevier
Cloud computing leads an organization for data storage, sharing, processing, and other
services. It was subjected to several challenges insecurity due to the presence of regular …

An efficient data integrity auditing protocol for cloud computing

N Garg, S Bawa, N Kumar - Future Generation Computer Systems, 2020 - Elsevier
Cloud data storage has brought a revolution in Information Technology (IT) sector with its
inherent benefits like ease of use, cost efficiency, location independence etc. By outsourcing …

Privacy preserving based logistic regression on big data

Y Fan, J Bai, X Lei, Y Zhang, B Zhang, KC Li… - Journal of network and …, 2020 - Elsevier
Cloud computing has strong computing power and huge storage space. Machine learning
algorithm, combining with cloud computing, makes the processing of large-scale data …

Efficient, revocable, and privacy-preserving fine-grained data sharing with keyword search for the cloud-assisted medical IoT system

Y Bao, W Qiu, P Tang, X Cheng - IEEE Journal of Biomedical …, 2021 - ieeexplore.ieee.org
The cloud-assisted medical Internet of Things (MIoT) has played a revolutionary role in
promoting the quality of public medical services. However, the practical deployment of cloud …

An enhanced security framework for secured data storage and communications in cloud using ECC, access control and LDSA

B Prabhu Kavin, S Ganapathy, U Kanimozhi… - Wireless Personal …, 2020 - Springer
In this paper, we propose an enhanced security framework for securing the cloud users data
in the cloud environment. This new security framework consists of access control …

On the opportunities of green computing: A survey

Y Zhou, X Lin, X Zhang, M Wang, G Jiang, H Lu… - arXiv preprint arXiv …, 2023 - arxiv.org
Artificial Intelligence (AI) has achieved significant advancements in technology and research
with the development over several decades, and is widely used in many areas including …

Scalable data storage design for nonstationary IoT environment with adaptive security and reliability

A Tchernykh, M Babenko, N Chervyakov… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) environment has a dynamic nature with high risks of confidentiality,
integrity, and availability violations. The loss of information, denial of access, information …

Efficient data integrity auditing supporting provable data update for secure cloud storage

C Yang, B Song, Y Ding, J Ou… - … and Mobile Computing, 2022 - Wiley Online Library
Cloud storage, an economically attractive service offered by cloud service providers (CSPs),
has attracted a large number of tenants. However, because the ownership and management …

Validating the integrity of convolutional neural network predictions based on zero-knowledge proof

Y Fan, B Xu, L Zhang, J Song, A Zomaya, KC Li - Information Sciences, 2023 - Elsevier
Abstract Machine Learning as a Service can provide outsourced deep learning model
prediction services to clients that do not have computing resources. Meanwhile, the integrity …