Improving Healthcare Data Security Using Cheon-Kim-Kim-Song (CKKS) Homomorphic Encryption

P Sathishkumar, K Pugalarasan… - 2024 International …, 2024 - ieeexplore.ieee.org
In recent years, the proliferation of mobile devices in healthcare settings has revolutionized
patient care delivery and medical data management. However, the increased reliance on …

Enhanced Cloud Data Security with Lightweight Chaotic Map and Quantum Key Distribution

MV Devi, G Aasha, P Vimal… - 2024 International …, 2024 - ieeexplore.ieee.org
In today's digital landscape, ensuring the security of data transmitted and stored in the cloud
is paramount. Traditional encryption methods face challenges in scalability and …

Privacy-Preserving Brakerski-Gentry-Vaikuntanathan (BGV) Homomorphic Encryption for IoMT Data Security

VV Kumar, P Pabitha - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
The rapid proliferation of Internet of Medical Things (IoMT) devices has revolutionized
healthcare, offering unprecedented opportunities for remote patient monitoring …

A Hybrid Strategy Integrating Ant Colony Optimization and Locust-Inspired Algorithm (HACO-LA) to Boost Efficiency and Performance in cloud Resource Management

S Saraswathy, J Malathi, N Subiksha… - … on Power Electronics …, 2024 - ieeexplore.ieee.org
Efficient cloud resource management is vital, as it ensures the accurate selection and
allocation of resources to diverse workloads or applications. This entails real-time balancing …

Securing Drones with Blockchain-Enabled Privacy-Preserving Authentication

P Saroopa, K Poongodi, V Saranya… - 2024 International …, 2024 - ieeexplore.ieee.org
The proliferation of drones in various industries has raised concerns about the security and
privacy of their operations. To address these concerns, this paper proposes a novel …

Hybrid Golden Jackal and Whale Optimization Algorithm (HGJWOA) for Optimizing Resource and Service Allocation in Edge Computing Environments

M Saradha, T Sasivanan… - 2024 International …, 2024 - ieeexplore.ieee.org
Edge computing has emerged as a promising paradigm to address the latency and
bandwidth constraints of traditional cloud computing by bringing computation and storage …

An Efficacy Analysis of Data using Fuzzy Logic and Fractal Encryption Techniques for Cloud Platform Data Security

P Dineshkumar, V Jeeva, C Nithiesh… - 2024 International …, 2024 - ieeexplore.ieee.org
In the realm of cloud computing, safeguarding data confidentiality is paramount. This paper
introduces a novel approach to data security in cloud platforms, merging fuzzy logic and …

Hybrid Grey Wolf and Particle Swarm Optimized (HGW-PSO) Scheduling in Containerized Cloud Computing Environment

MJ Rathnam, A Babu, G Harikumar… - 2024 5th International …, 2024 - ieeexplore.ieee.org
The concept of containerization consists of encapsulating applications with their libraries
with the help of operating system level virtualization, ensuring they are separated from other …

Differential Privacy in Spatial Task Assignment for Cloud Crowdsourcing

S Santhosh, S Vadivel, PC Yoga… - 2024 International …, 2024 - ieeexplore.ieee.org
Spatial crowdsourcing platforms enable efficient task assignment based on the geographical
locations of workers. However, ensuring the privacy of users' location data poses a …

Optimizing Resource Utilization in IoT based Smart Home Automation: A Hybrid Crow Search and Border Collie Optimization Approach

VP Dhivya, SV Adhiyaman, S Elangavi… - 2024 International …, 2024 - ieeexplore.ieee.org
Smart home automation systems are now essential parts of contemporary living, providing
convenience, energy efficiency, and improved security. Efficient compute offloading …