Data security in smart devices: Advancement, constraints and future recommendations

Z Wenhua, M Kamrul Hasan, AF Ismail, Z Yanke… - IET …, 2023 - Wiley Online Library
Network security protocols are implemented to address network security challenges.
Computer networks and applications have advanced and developed significantly in recent …

Cybersecurity in big data era: From securing big data to data-driven security

DB Rawat, R Doku, M Garuba - IEEE Transactions on Services …, 2019 - ieeexplore.ieee.org
''Knowledge is power” is an old adage that has been found to be true in today's information
age. Knowledge is derived from having access to information. The ability to gather …

[PDF][PDF] Data Security and Privacy in the IoT.

E Bertino - EDBT, 2016 - cs.purdue.edu
Deploying existing data security solutions to the Internet of Things (IoT) is not straightforward
because of device heterogeneity, highly dynamic and possibly unprotected environments …

[HTML][HTML] A new lightweight data security system for data security in the cloud computing

S Mohammed, S Nanthini, NB Krishna, IV Srinivas… - Measurement …, 2023 - Elsevier
In recent decades, data has proved indispensable to all facets of human existence. The
development of several applications has resulted in the exponential expansion of data. This …

Hardware and embedded security in the context of internet of things

A Kanuparthi, R Karri, S Addepalli - … of the 2013 ACM workshop on …, 2013 - dl.acm.org
Internet of Things (IoT) is the interconnection of a large number of resource-constrained
devices such as sensors, actuators, and nodes that generate large volumes of data which …

[PDF][PDF] Data security

P Samarati, S Jajodia - Wiley Encyclopedia of Electrical and Electronics …, 1999 - Citeseer
The term data security refers to the protection of information against possible violations that
can compromise its secrecy (or con dentiality), integrity, or availability. Secrecy is …

Data security in cloud-based applications

S Pandey, GN Purohit, UM Munshi - Data Science Landscape: Towards …, 2018 - Springer
Data Security in Cloud-Based Applications | SpringerLink Skip to main content Advertisement
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …

A survey of big data security solutions in healthcare

M Siddique, MA Mirza, M Ahmad, J Chaudhry… - Security and Privacy in …, 2018 - Springer
Today data is a strategic asset and organizational goal is to maximize the value of their
information. The concept of big data is now treated from different points of view covering its …

Hardware based data security techniques in iot: A review

JG Rajan, RS Ganesh - 2022 3rd International Conference on …, 2022 - ieeexplore.ieee.org
Internet Of Things has already started gaining acceptance and its implementation has begun
from small scale to large scale in different applications like healthcare, industries …

Network Security Tools and Applications in Research Perspective

SB Vyshnavi, SR Sree… - … on I-SMAC (IoT in Social …, 2019 - ieeexplore.ieee.org
The modern world technology is civilized, globalized and modernized. The technological
development of social networks and e-commerce applications produce larger data. This …