Metaverse security and privacy: An overview

Z Chen, J Wu, W Gan, Z Qi - … Conference on Big Data (Big Data …, 2022 - ieeexplore.ieee.org
Metaverse is a living space and cyberspace that realizes the process of virtualizing and
digitizing the real world. It integrates a plethora of existing technologies with the goal of …

Cryptography algorithms for enhancing IoT security

F Thabit, O Can, AO Aljahdali, GH Al-Gaphari… - Internet of Things, 2023 - Elsevier
In today's fast-paced world, a new technology paradigm known as the Internet of Things
(IoT) is advancing every business. It provides communication between the digital and …

[HTML][HTML] A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing

F Thabit, O Can, S Alhomdy, GH Al-Gaphari… - International Journal of …, 2022 - Elsevier
Cloud computing is a technology in which the resources are delivered as services. Users
can access them anywhere, anytime via the Internet without any need to know the …

A hybrid encryption solution to improve cloud computing security using symmetric and asymmetric cryptography algorithms

H Abroshan - … Journal of Advanced Computer Science and …, 2021 - search.proquest.com
Ensuring the security of cloud computing is one of the most critical challenges facing the
cloud services sector. Dealing with data in a cloud environment, which uses shared …

Investigating factors influencing individual user's intention to adopt cloud computing: a hybrid approach using PLS-SEM and fsQCA

RC Chanda, A Vafaei-Zadeh, H Hanifah, T Ramayah - Kybernetes, 2023 - emerald.com
Purpose The main objective of this study is to investigate the factors that influence the
adoption intention of cloud computing services among individual users using the extended …

Privacy-aware genetic algorithm based data security framework for distributed cloud storage

M Kamal, S Amin, F Ferooz, MJ Awan… - Microprocessors and …, 2022 - Elsevier
An increased use of data driven applications and integrated systems have caused an
accelerating expansion in data volumes and increase in the number of digital records, over …

Implication of lightweight and robust hash function to support key exchange in health sensor networks

M Al-Zubaidie - Symmetry, 2023 - mdpi.com
Internet of Things (IoT) applications are critical for the fast delivery of health information/data
in different environments. The wireless sensor network (WSN) can be used within IoT …

[HTML][HTML] A new lightweight data security system for data security in the cloud computing

S Mohammed, S Nanthini, NB Krishna, IV Srinivas… - Measurement …, 2023 - Elsevier
In recent decades, data has proved indispensable to all facets of human existence. The
development of several applications has resulted in the exponential expansion of data. This …

An efficient and secure key management with the extended convolutional neural network for intrusion detection in cloud storage

S Ahmad, S Mehfuz, J Beg - Concurrency and Computation …, 2023 - Wiley Online Library
Cloud computing aids users for storing and recovering their information everywhere in the
world. Security and efficiency are the two main issues in cloud service. Numerous intrusion …

Ensuring privacy and confidentiality of cloud data: A comparative analysis of diverse cryptographic solutions based on run time trend

JK Dawson, T Frimpong, JB Hayfron Acquah… - Plos one, 2023 - journals.plos.org
The cloud is becoming a hub for sensitive data as technology develops, making it
increasingly vulnerable, especially as more people get access. Data should be protected …