Adaptive Autonomous Protocol for Secured Remote Healthcare Using Fully Homomorphic Encryption (AutoPro-RHC)

RK Sheu, YC Lin, MS Pardeshi, CY Huang, KC Pai… - Sensors, 2023 - mdpi.com
The outreach of healthcare services is a challenge to remote areas with affected
populations. Fortunately, remote health monitoring (RHM) has improved the hospital service …

Multi-layered access control based auto tuning relational key implications in enterprise-level multi-tenancy

SK Henge, R Rajakumar, P Prasanna… - Multimedia Tools and …, 2024 - Springer
This article discusses the importance of cloud-based multi-tenancy in private–public-private
secure cloud environments, which is achieved through the isolation of end-user data and …

[PDF][PDF] Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology.

SK Henge, G Jayaraman, M Sreedevi… - Networks & …, 2023 - researchgate.net
The central remote servers are essential for storing and processing data for cloud computing
evaluation. However, traditional systems need to improve their ability to provide technical …

Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms

SK Henge, GU Maheswari, R Ramalingam… - Systems, 2023 - mdpi.com
This article discusses the importance of cross-platform UX/UI designs and frameworks and
their effectiveness in building web applications and websites. Third-party libraries (TPL) and …

A Systematic Review on a Multi-tenant Database Management System in Cloud Computing

M Battula - … International Conference on Cognitive Robotics and …, 2024 - ieeexplore.ieee.org
As Cloud Computing (CC) continues to revolutionize, the demand for efficient and secure
data management solutions has never been greater. Multi-tenant database Management …

Proof of Elapsed Storage and Time-Data Storage as a Service: Secure Multi-Tenant Database Management System

M Battula - 2023 2nd International Conference on Automation …, 2023 - ieeexplore.ieee.org
Blockchain (BC) based cloud computing is an innovative approach that combines the
principles of BC technology with traditional cloud computing infrastructure to offer enhanced …

Application-aware multi-tenant scheduling mechanism model of power cloud platform

H Ji, J Liu, J Ye, X Wu - 2022 IEEE 5th Advanced Information …, 2022 - ieeexplore.ieee.org
Power multi-tenant data centers widely use distributed parallel computing frameworks to
process data, and applications from different tenants share and compete for bandwidth …

[PDF][PDF] Secure data encryption key scenario for protecting private data security and privacy

A Pradesh - … .s3.ap-south-1.amazonaws.com
Cryptography, specifically encryption, plays a pivotal role in protecting data from
unauthorized access. However, not all encryption methods are equally effective, as some …

[PDF][PDF] Analysis and detection of insider attacks using behaviour rule based architecture in enterprise multitenancy

SK Henge, A Upadhyay, AK Saini, N Mishra, D Sharma… - researchgate.net
© Analysis and detection of insider attacks using behaviour rule based architecture in
enterprise multitenancy Santosh Kumar He Page 1 © Analysis and detection of insider …