[PDF][PDF] Threats and vulnerabilities of cloud computing: a review

PS Suryateja - International Journal of Computer Sciences and …, 2018 - researchgate.net
Cloud computing is a new frontier in computing technologies. It is well known for its pay-per-
use model for billing customers and providing other features like elasticity, ubiquity …

IoT enabled cancer prediction system to enhance the authentication and security using cloud computing

M Anuradha, T Jayasankar, NB Prakash… - Microprocessors and …, 2021 - Elsevier
In recent days, Internet of Things, Cloud Computing, Deep learning, Machine learning and
Artificial Intelligence are considered to be an emerging technologies to solve variety of real …

Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective

G Kapil, A Agrawal, A Attaallah, A Algarni… - PeerJ Computer …, 2020 - peerj.com
Hadoop has become a promising platform to reliably process and store big data. It provides
flexible and low cost services to huge data through Hadoop Distributed File System (HDFS) …

Cloud E-health systems: a survay on security challenges and solutions

MA Kamoona, AM Altamimi - 2018 8th International …, 2018 - ieeexplore.ieee.org
Cloud progression have led it to be adapted in many aspects and application that serve
human demands. One of the recent trends in cloud computing is the e-health services, as …

Top vulnerabilities in cloud computing

S Kumar, H Gautam, S Singh, M Shafeeq - ECS Transactions, 2022 - iopscience.iop.org
Cloud computing is rising quickly and without uncertainty it is the new generation of
technology where people will utilize whenever and wherever. In this web-based world, cloud …

[PDF][PDF] A Survey on Secure Cloud-Based E-Health Systems.

DK Yadav, S Behera - EAI Endorsed Transactions on …, 2020 - pdfs.semanticscholar.org
INTRODUCTION: The e-health (electronic health) system is one of many cloud services
which uses computer or electronic systems and cloud technology as its main source of …

AUDITEM: toward an automated and efficient data integrity verification model using blockchain

Z Shi, J Bergers, K Korsmit, Z Zhao - arXiv preprint arXiv:2207.00370, 2022 - arxiv.org
Data tampering is often considered a severe problem in industrial applications as it can lead
to inaccurate financial reports or even a corporate security crisis. A correct representation of …

Protection of mental healthcare documents using sensitivity-based encryption

K Rangaraj, V Veerasamy… - International Journal of …, 2021 - inderscienceonline.com
As all the domains move towards digitisation, maintaining voluminous digital data becomes
a vital issue in organisations and enterprises. Especially ensuring data security and privacy …

Scalable and secure sharing of personal health records in cloud computing

R Kalaiselvi, K Kousalya, R Varshaa… - Gazi University Journal …, 2016 - dergipark.org.tr
Personal Health Record (PHR) is an electronic application used by the patients to maintain
and manage their health information in a private, secure and confidential environment. In …

EgyHealth System: A Mobile Healthcare System Application with Android and Cloud Computing

AA Ali, NF Omran, AA Alsayied - Advanced Machine Learning …, 2021 - Springer
Healthcare mobile applications provide better care and quality of services: maintaining
patient confidentiality, managing patient records, and storing and retrieving data. Using …