AI-HybridChain: Picturized Authentication and DRL based Access Control Method with Secure Two Fold Revocation for Ensuring Cloud Computing Security

SC Krishnan - Future Generation Computer Systems, 2024 - Elsevier
The Internet of Things is susceptible to seepage of private information during the data
sharing. To circumvent this problem, access control and secure data sharing have been …

A Review of Artificial Intelligence Techniques for Improved Cloud and IoT Security

K Kalinaki, W Shafik, M Masha, AA Alli - Emerging Technologies for …, 2024 - igi-global.com
The current surge in interconnected devices, which includes the Internet of Things (IoT)
devices and the continually expanding cloud infrastructure, marks a new era of digital …

A Sustainable Blockchain and Asymmetric Broadcast Encryption-Based Secure E-Healthcare System

S Yadav, V Yadav - … Security Practices Using Blockchain, Quantum and …, 2024 - Springer
The value of healthcare records has skyrocketed due to the emergence of many new
diseases and the ongoing pandemic situations. With these healthcare records spread …