A dynamic four-step data security model for data in cloud computing based on cryptography and steganography

R Adee, H Mouratidis - Sensors, 2022 - mdpi.com
Cloud computing is a rapidly expanding field. It allows users to access computer system
resources as needed, particularly data storage and computational power, without managing …

Efficient data security using hybrid cryptography on cloud computing

P Chinnasamy, S Padmavathi, R Swathy… - … : Proceedings of ICICCT …, 2021 - Springer
Services are distributed among all servers and between the users and individuals in the
cloud environment. Cloud providers have trouble guaranteeing file protection as security is …

Cryptographic technologies and protocol standards for Internet of Things

S Zeadally, AK Das, N Sklavos - Internet of Things, 2021 - Elsevier
Abstract The Internet of Things (IoT) comprises physical/virtual networked objects that collect
and exchange data with each other via the public Internet. As this exchange often takes …

HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud

P Chinnasamy, P Deepalakshmi - Journal of Ambient Intelligence and …, 2022 - Springer
Technology that is perfect is free of vulnerability. Technological growth offers users online
data storage and access to it from anywhere. Cloud computing is a model that provides data …

Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry

M Qiu, K Gai, B Thuraisingham, L Tao… - Future generation …, 2018 - Elsevier
As one of the most significant issues in the financial industry, customers' privacy information
protection has been considered a challenging research over years. The constant …

A survey of security and privacy challenges in cloud computing: solutions and future directions

Y Liu, YL Sun, J Ryoo, AV Vasilakos - 2015 - scholarcommons.scu.edu
While cloud computing is gaining popularity, diverse security and privacy issues are
emerging that hinder the rapid adoption of this new computing paradigm. And the …

Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud

J Liu, B Zhao, J Qin, X Hou, J Ma - Information Sciences, 2023 - Elsevier
Searchable encryption (SE) meets users' demand for the keyword search on encrypted data.
Key-aggregate searchable encryption (KASE) improves data owners' ability to selectively …

Mobile agents system security: A systematic survey

P Bagga, R Hans - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
A pivotal cause for the boom of Mobile Agent paradigm relies on the competence to ward off
security attacks. This article surveys the prevalent attacks on the mobile agents and the …

An efficient technique for cloud storage using secured de-duplication algorithm

P Mohan, M Sundaram, S Satpathy… - Journal of Intelligent & …, 2021 - content.iospress.com
Techniques of data compression involve de-duplication of data that plays an important role
in eliminating duplicate copies of information and has been widely employed in cloud …

Design of secure storage for health-care cloud using hybrid cryptography

P Chinnasamy, P Deepalakshmi - 2018 second international …, 2018 - ieeexplore.ieee.org
More recently, any technology can't be stated perfect until it's totally free of any vulnerability.
There are many technologies has grown in day-to-day life that offer online data storage …