An iot-centric data protection method for preserving security and privacy in cloud

R Gupta, I Gupta, AK Singh, D Saxena… - IEEE Systems …, 2022 - ieeexplore.ieee.org
A malevolent utility provider may extract outsourced data from the cloud while storing,
analyzing, and sharing the data among the involved entities to acquire sensitive information …

Enhanced authentication for de-duplication of big data on cloud storage system using machine learning approach

M Akbar, I Ahmad, M Mirza, M Ali, P Barmavatu - Cluster Computing, 2024 - Springer
Enormous information is an accumulation of vast measures of information that contains
copied things gathered from different sources. Distinguishing copied information from …

Secure Outsourced SIFT: Accurate and Efficient Privacy-Preserving Image SIFT Feature Extraction

X Liu, X Zhao, Z Xia, Q Feng, P Yu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud computing has become an important IT infrastructure in the big data era; more and
more users are motivated to outsource the storage and computation tasks to the cloud server …

SeCoM: An outsourced cloud-based secure communication model for advanced privacy preserving data computing and protection

I Gupta, D Saxena, AK Singh, CN Lee - IEEE Systems Journal, 2023 - ieeexplore.ieee.org
A malignant entity may access outsourced healthcare data in Internet of Things (IoT) and
cloud environments during data sharing, analysis, and communication among the involved …

FedMUP: Federated learning driven malicious user prediction model for secure data distribution in cloud environments

K Gupta, D Saxena, R Gupta, J Kumar, AK Singh - Applied Soft Computing, 2024 - Elsevier
Cloud computing is flourishing at a rapid pace. Significant consequences related to data
security appear as a malicious user may get unauthorized access to sensitive data which …

Security and privacy-preservation of iot data in cloud-fog computing environment

J Kumar, AK Singh - arXiv preprint arXiv:2212.00321, 2022 - arxiv.org
IoT is the fastest-growing technology with a wide range of applications in various domains.
IoT devices generate data from a real-world environment every second and transfer it to the …

A review on secure cloud resource management

S Chhabra, D Saxena, S Rekha - Authorea Preprints, 2023 - techrxiv.org
Security is always a prime concern of every cloud user. Many pioneer surveys have been
done concerning security during data communication among owners, users, and …

IN-GFD: An Interpretable Graph Fraud Detection Model for Spam Reviews

H Yu, W Liu, N Zhu, P Li, X Luo - IEEE Transactions on Artificial …, 2024 - ieeexplore.ieee.org
With the development of the e-commerce platform, more and more reviews of its various
formats continue to appear. Reviews help people buy the right item faster, and instead …

MAIDS: malicious agent identification-based data security model for cloud environments

K Gupta, D Saxena, R Gupta, AK Singh - Cluster Computing, 2024 - Springer
With the vigorous development of cloud computing, most organizations have shifted their
data and applications to the cloud environment for storage, computation, and sharing …

Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach

MZ Khan, M Shoaib, MS Husain, K Ul Nisa… - Journal of Cloud …, 2024 - Springer
Cloud computing is a new paradigm in this new cyber era. Nowadays, most organizations
are showing more reliability in this environment. The increasing reliability of the Cloud also …