Brakerski‐Gentry‐Vaikuntanathan fully homomorphic encryption cryptography for privacy preserved data access in cloud assisted Internet of Things services using …

MR Suma, P Madhumathy - Transactions on Emerging …, 2022 - Wiley Online Library
Health monitoring sensors are widely available to monitor patients' health remotely. The
collected sensor data are sent to cloud storage and processed in a remote health monitoring …

Deep Robust Cramer Shoup delay optimized fully homomorphic for IIOT secured transmission in cloud computing

Q Li, Y Yue, Z Wang - Computer Communications, 2020 - Elsevier
Several sensors obtain data during industrial outturn and send this collected data to the
cloud server via Internet communication. Due to the reason that a cloud server is not an …

A novel identity-based multi-signature scheme over NTRU lattices

X Chen, Q Huang, H Li, Z Liao, W Susilo - Theoretical Computer Science, 2022 - Elsevier
Multi-signature is an important technology to compress multiple signatures on the common
message into a compact one, thereby reducing the consumption of storage space and …

[PDF][PDF] Intelligent Digital Envelope for Distributed Cloud-Based Big Data Security.

SP Chelladurai, T Rajagopalan - Comput. Syst. Sci. Eng., 2023 - cdn.techscience.cn
Cloud computing offers numerous web-based services. The adoption of many Cloud
applications has been hindered by concerns about data security and privacy. Cloud service …

Proficient approaches for scalability and security in IoT through edge/fog/cloud computing: a survey

KS Kumar, AS Radhamani… - International Journal of …, 2021 - inderscienceonline.com
Cloud computing has evolved to the extent of 5G and the Internet of Things (IoT). For data
warehousing, cloud computing paves an essential role in processing and implementation …

[PDF][PDF] The risk assessment on the security of industrial internet infrastructure under intelligent convergence with the case of GE's intellectual transformation

J Zhao, D Wu - Mathematical Biosciences and Engineering, 2022 - aimspress.com
The industrial internet depends on the development of cloud computing, artificial
intelligence, and big data analysis. Intelligent fusion is dependent on the architecture and …

Securing IoT networks in cloud computing environments: a real-time IDS

S Biswas, MSA Ansari - The Journal of Supercomputing, 2024 - Springer
Abstract The term “Internet of Things”(IoT) encompasses an entire group of gadgets that are
capable of connecting to the Internet in order to gather and share data. The IoT paradigm is …

Internet of things security: a survey

SA Baker, AS Nori - Advances in Cyber Security: Second International …, 2021 - Springer
Abstract Internet of Things (IoT) has attracted considerable attention, let alone acquaintance,
in academia and industry in particular over the last few years. The factors behind this …

A deep learning cache framework for privacy security on heterogeneous IoT networks

J Li, M Feng, S Li - IEEE Access, 2024 - ieeexplore.ieee.org
Caching technology is essential for enhancing content transmission rates and reducing data
transmission delays in heterogeneous networks, making it a crucial component of the …

A Secure Framework for IoT Healthcare Data Using Hybrid Encryption

S Fatima, S Hussain, N Shahzadi… - … on Emerging Trends …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) plays a vital role in the growth of medical healthcare industry.
Therefore, to secure the medical data as well as privacy of users is of major concern. In this …