[HTML][HTML] A review on secure data deduplication: Cloud storage security issue

P Prajapati, P Shah - Journal of King Saud University-Computer and …, 2022 - Elsevier
Cloud storage service providers caters to the need of organizations and individuals by
allowing them to store, transfer and backup their ever-increasing amount of data at low cost …

A review of various challenges in cybersecurity using artificial intelligence

H Chaudhary, A Detroja, P Prajapati… - 2020 3rd international …, 2020 - ieeexplore.ieee.org
Cybersecurity using Artificial Intelligence is a double-edged sword, it can improve security
substantially but it also creates a possibility of new forms of attack, which performed on …

A review on recent intrusion detection systems and intrusion prevention systems in IoT

P Prajapati, B Bhatt, G Zalavadiya… - … on Cloud Computing …, 2021 - ieeexplore.ieee.org
IoT Security is the prime region prone to security malfunctioning. IoT includes the set-up of
different incorporated physical as well as virtual devices that are accessible over the …

Convergent encryption enabled secure data deduplication algorithm for cloud environment

S Ahmad, M Arif, J Ahmad, M Nazim… - Concurrency and …, 2024 - Wiley Online Library
The exponential growth of data poses a critical challenge for cloud storage systems.
Redundant data consumes valuable storage space and increases infrastructure costs. Data …

[PDF][PDF] Efficient Cross User Client Side Data Deduplication in Hadoop.

P Prajapati, P Shah, A Ganatra, S Patel - J. Comput., 2017 - jcomputers.us
Hadoop is widely used for applications like Aadhaar card, Healthcare, Media, Ad Platform,
Fraud Detection & Crime, and Education etc. However, it does not provide efficient and …

Provable data possession using identity-based encryption

S Kadvani, A Patel, M Tilala, P Prajapati… - … Technology for Intelligent …, 2019 - Springer
Nowadays, we have many remote data storage systems available which allow clients to
store their data on remote server. But these systems possess many security problems like …

[PDF][PDF] A review of recent detection methods for http ddos attacks

P Prajapati, N Patel, P Shah - International Journal of Scientific, 2019 - researchgate.net
There has been a tremendous increase in dependency on web technologies alongside
which its disruption attempts have also increased. Web servers that run on Hypertext …

Security Concerns and Data Breaches for Data Deduplication Techniques in Cloud Storage: A Brief Meta-Analysis.

A Goel, C Prabha, M Malik… - International Journal of …, 2024 - search.ebscohost.com
Over the last decade, data has exploded on cloud storage, and outsourcing data to cloud
storage has become an appealing trend, which is not a fully reliable service. Data growth …

A review of recent trends on DNA based cryptography

G Bhoi, R Bhavsar, P Prajapati… - 2020 3rd International …, 2020 - ieeexplore.ieee.org
One of the emerging methodologies nowadays in the field of cryptography based on human
DNA sequences. As the research says that even a limited quantity of DNA can store gigantic …

Comparative Analysis of Image Enhancement Techniques: A Study on Combined and Individual Approaches

A Bhaskar, B Joshi - International Conference on Communication and …, 2023 - Springer
This research conducts a comprehensive analysis contrasting amalgamated and individual
techniques for image enhancement. A groundbreaking methodology is introduced …