Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review

A Majeed - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Anonymization techniques are widely used to make personal data broadly available for
analytics/data-mining purposes while preserving the privacy of the personal information …

An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud

K Anand, A Vijayaraj, M Vijay Anand - Peer-to-Peer Networking and …, 2022 - Springer
Cloud file access is the most widely used peer-to-peer (P2P) application, in which users
share their data and other users can access it via P2P networks. The need for security in the …

Enhancing resource utilization and privacy in IoT data placement through fuzzy logic and PSO optimization

K Dhanushkodi, R Kumar, P Mittal, SS Das… - Cluster …, 2024 - Springer
The exponential growth of Internet of Things (IoT) devices has ushered in an era of vast data
generation, necessitating abundant resources for data storage and processing. Cloud …

[PDF][PDF] Performance Comparison of Xen AND Hyper-V in Cloud Computing While Using Cryptosystems.

WK Abdulraheem - International Journal of Advances in Soft Computing & …, 2022 - i-csrs.org
Cloud computing is internet-distributed computing model transferring processes from
personal computers or servers to cloud servers. Nowadays, security and performance of …

[PDF][PDF] Secured Framework for Assessment of Chronic Kidney Disease in Diabetic Patients.

SM Aldossary - Intelligent Automation & Soft Computing, 2023 - cdn.techscience.cn
With the emergence of cloud technologies, the services of healthcare systems have grown.
Simultaneously, machine learning systems have become important tools for developing …

Wireless 6G Cloud Communication Based Security Analysis Using Machine Learning in Internet of Medical Things (IoMT)

J Chen, Y Xu, X Zhu, R Han - Wireless Personal Communications, 2024 - Springer
In order to safeguard confidentiality of patient data, healthcare data should not be made
available to unauthorized individuals. By 2030, the so-called sixth generation (6G) of …

Secure Data Transmission in Wireless Adhoc Networks by Detecting Wormhole Attack

KD Thilak, S Saranya, K Kalaiselvi… - … on Smart Structures …, 2022 - ieeexplore.ieee.org
Wireless Network Coding System encrypts data as it travels via intermediate nodes for
secure data transmission, Wormhole attackers choose one of the nodes to target. The …

Wireless Sensor Networks Consistent and Honest Routing Scheme

A Vijayaraj, B Reethika, K Santhiya… - 2023 International …, 2023 - ieeexplore.ieee.org
A key concern in large-scale dense wireless sensor networks is the efficient usage of energy
(WSNs). There is a better likelihood of redundant data due to more number of nodes within …

Organic and Recyclable Waste Classification Using Integrated Feature Selection Method

A Vijayaraj, S Shreya, G Deepana… - 2023 International …, 2023 - ieeexplore.ieee.org
This paper suggests a new approach to enhancing waste classification performance using
deep learning algorithms. Specifically, the proposed approach integrates an autoencoder …

Enhanced Hybrid Optimal and Intelligent Technique for Data Storage in Cloud

R Kavitha, A Valarmathi - National Conference on Reliability and Safety, 2022 - Springer
Electronic health records are rapidly becoming more prevalent in healthcare organizations.
They are being used to store and share patient data. Due to the increasing cost of …