Artificial lizard search optimized fuzzy logic approach to addressing authentication and data security challenges in P2P cloud environments

BJ Chelliah - Computers & Security, 2023 - Elsevier
The cloud is a widely used technology for inter-organizational data exchange and managing
digital information. Even though it offers significant potential for user convenience it is …

Privacy preserving secure data exchange in mobile P2P cloud healthcare environment

SMM Rahman, MM Masud, MA Hossain… - Peer-to-Peer Networking …, 2016 - Springer
Cloud computing technology offers the possibility of inter-organizational medical data
sharing at a larger scale. The different organizations can maintain their own cloud …

Secure and optimal authentication framework for cloud management using HGAPSO algorithm

P Selvarani, A Suresh, N Malarvizhi - Cluster Computing, 2019 - Springer
Data security is the major problem in cloud computing. To overcome this problem in the
existing work Password can be used as a key to encrypt and decrypt the data in cloud …

Authentication and key agreement based on anonymous identity for peer-to-peer cloud

H Zhong, C Zhang, J Cui, Y Xu… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Cross-cloud data migration is one of the prevailing challenges faced by mobile users, which
is an essential process when users change their mobile phones to a different provider …

Secure and lightweight authentication protocol for anonymous data access in cloud assisted iot system

V Mahor, R Padmavathy, S Chatterjee - Peer-to-Peer Networking and …, 2024 - Springer
Rapid evolution of IoT technologies has virtually made connectivity of all the real world
objects to the internet possible with the help of tiny embedded devices also known as IoT …

An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud

K Anand, A Vijayaraj, M Vijay Anand - Peer-to-Peer Networking and …, 2022 - Springer
Cloud file access is the most widely used peer-to-peer (P2P) application, in which users
share their data and other users can access it via P2P networks. The need for security in the …

[PDF][PDF] Revolutionizing Healthcare: Unleashing Blockchain Brilliance Through Fuzzy Logic Authentication

T Alkhdour, MA Almaiah, A Ali, A Lutfi… - Journal Of Theoretical …, 2024 - researchgate.net
In the ever-evolving landscape of digital healthcare, security and authentication emerge as
paramount concerns. This paper introduces an innovative strategy aimed at tackling these …

Hybrid heuristic-based key generation protocol for intelligent privacy preservation in cloud sector

SM Rubai - Journal of Parallel and Distributed Computing, 2022 - Elsevier
Cloud Computing is defined as a set of software and hardware that are used together for
delivering different kinds of cloud services based on user's demand. Cloud computing …

An identity management scheme for cloud computing: Review, challenges, and future directions

AM Mostafa, E Rushdy, R Medhat… - Journal of Intelligent & …, 2023 - content.iospress.com
Cloud computing is a cost-effective way for organizations to access and use IT resources.
However, it also exposes data to security threats. Authentication and authorization are …

Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm

SI Shyla, SS Sujatha - Journal of Ambient Intelligence and Humanized …, 2022 - Springer
Cloud computing is currently playing an important role in the information technology industry
because of its improved efficiency, wide access, low cost, and many benefits. It also provides …