[HTML][HTML] A review on secure data deduplication: Cloud storage security issue
P Prajapati, P Shah - Journal of King Saud University-Computer and …, 2022 - Elsevier
Cloud storage service providers caters to the need of organizations and individuals by
allowing them to store, transfer and backup their ever-increasing amount of data at low cost …
allowing them to store, transfer and backup their ever-increasing amount of data at low cost …
A review of various challenges in cybersecurity using artificial intelligence
H Chaudhary, A Detroja, P Prajapati… - 2020 3rd international …, 2020 - ieeexplore.ieee.org
Cybersecurity using Artificial Intelligence is a double-edged sword, it can improve security
substantially but it also creates a possibility of new forms of attack, which performed on …
substantially but it also creates a possibility of new forms of attack, which performed on …
A review on recent intrusion detection systems and intrusion prevention systems in IoT
P Prajapati, B Bhatt, G Zalavadiya… - … on Cloud Computing …, 2021 - ieeexplore.ieee.org
IoT Security is the prime region prone to security malfunctioning. IoT includes the set-up of
different incorporated physical as well as virtual devices that are accessible over the …
different incorporated physical as well as virtual devices that are accessible over the …
Convergent encryption enabled secure data deduplication algorithm for cloud environment
S Ahmad, M Arif, J Ahmad, M Nazim… - Concurrency and …, 2024 - Wiley Online Library
The exponential growth of data poses a critical challenge for cloud storage systems.
Redundant data consumes valuable storage space and increases infrastructure costs. Data …
Redundant data consumes valuable storage space and increases infrastructure costs. Data …
[PDF][PDF] Efficient Cross User Client Side Data Deduplication in Hadoop.
Hadoop is widely used for applications like Aadhaar card, Healthcare, Media, Ad Platform,
Fraud Detection & Crime, and Education etc. However, it does not provide efficient and …
Fraud Detection & Crime, and Education etc. However, it does not provide efficient and …
Provable data possession using identity-based encryption
S Kadvani, A Patel, M Tilala, P Prajapati… - … Technology for Intelligent …, 2019 - Springer
Nowadays, we have many remote data storage systems available which allow clients to
store their data on remote server. But these systems possess many security problems like …
store their data on remote server. But these systems possess many security problems like …
[PDF][PDF] A review of recent detection methods for http ddos attacks
P Prajapati, N Patel, P Shah - International Journal of Scientific, 2019 - researchgate.net
There has been a tremendous increase in dependency on web technologies alongside
which its disruption attempts have also increased. Web servers that run on Hypertext …
which its disruption attempts have also increased. Web servers that run on Hypertext …
Security Concerns and Data Breaches for Data Deduplication Techniques in Cloud Storage: A Brief Meta-Analysis.
Over the last decade, data has exploded on cloud storage, and outsourcing data to cloud
storage has become an appealing trend, which is not a fully reliable service. Data growth …
storage has become an appealing trend, which is not a fully reliable service. Data growth …
A review of recent trends on DNA based cryptography
G Bhoi, R Bhavsar, P Prajapati… - 2020 3rd International …, 2020 - ieeexplore.ieee.org
One of the emerging methodologies nowadays in the field of cryptography based on human
DNA sequences. As the research says that even a limited quantity of DNA can store gigantic …
DNA sequences. As the research says that even a limited quantity of DNA can store gigantic …
Comparative Analysis of Image Enhancement Techniques: A Study on Combined and Individual Approaches
A Bhaskar, B Joshi - International Conference on Communication and …, 2023 - Springer
This research conducts a comprehensive analysis contrasting amalgamated and individual
techniques for image enhancement. A groundbreaking methodology is introduced …
techniques for image enhancement. A groundbreaking methodology is introduced …