HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud
P Chinnasamy, P Deepalakshmi - Journal of Ambient Intelligence and …, 2022 - Springer
Technology that is perfect is free of vulnerability. Technological growth offers users online
data storage and access to it from anywhere. Cloud computing is a model that provides data …
data storage and access to it from anywhere. Cloud computing is a model that provides data …
Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN)
E Balamurugan, A Mehbodniya, E Kariri, K Yadav… - Pattern recognition …, 2022 - Elsevier
Cloud computing leads an organization for data storage, sharing, processing, and other
services. It was subjected to several challenges insecurity due to the presence of regular …
services. It was subjected to several challenges insecurity due to the presence of regular …
An efficient data integrity auditing protocol for cloud computing
Cloud data storage has brought a revolution in Information Technology (IT) sector with its
inherent benefits like ease of use, cost efficiency, location independence etc. By outsourcing …
inherent benefits like ease of use, cost efficiency, location independence etc. By outsourcing …
Privacy preserving based logistic regression on big data
Cloud computing has strong computing power and huge storage space. Machine learning
algorithm, combining with cloud computing, makes the processing of large-scale data …
algorithm, combining with cloud computing, makes the processing of large-scale data …
Efficient, revocable, and privacy-preserving fine-grained data sharing with keyword search for the cloud-assisted medical IoT system
Y Bao, W Qiu, P Tang, X Cheng - IEEE Journal of Biomedical …, 2021 - ieeexplore.ieee.org
The cloud-assisted medical Internet of Things (MIoT) has played a revolutionary role in
promoting the quality of public medical services. However, the practical deployment of cloud …
promoting the quality of public medical services. However, the practical deployment of cloud …
An enhanced security framework for secured data storage and communications in cloud using ECC, access control and LDSA
In this paper, we propose an enhanced security framework for securing the cloud users data
in the cloud environment. This new security framework consists of access control …
in the cloud environment. This new security framework consists of access control …
On the opportunities of green computing: A survey
Artificial Intelligence (AI) has achieved significant advancements in technology and research
with the development over several decades, and is widely used in many areas including …
with the development over several decades, and is widely used in many areas including …
Scalable data storage design for nonstationary IoT environment with adaptive security and reliability
Internet-of-Things (IoT) environment has a dynamic nature with high risks of confidentiality,
integrity, and availability violations. The loss of information, denial of access, information …
integrity, and availability violations. The loss of information, denial of access, information …
Efficient data integrity auditing supporting provable data update for secure cloud storage
C Yang, B Song, Y Ding, J Ou… - … and Mobile Computing, 2022 - Wiley Online Library
Cloud storage, an economically attractive service offered by cloud service providers (CSPs),
has attracted a large number of tenants. However, because the ownership and management …
has attracted a large number of tenants. However, because the ownership and management …
Validating the integrity of convolutional neural network predictions based on zero-knowledge proof
Abstract Machine Learning as a Service can provide outsourced deep learning model
prediction services to clients that do not have computing resources. Meanwhile, the integrity …
prediction services to clients that do not have computing resources. Meanwhile, the integrity …