CryptoGA: a cryptosystem based on genetic algorithm for cloud data security

M Tahir, M Sardaraz, Z Mehmood, S Muhammad - Cluster Computing, 2021 - Springer
Cloud Computing is referred to as a set of hardware and software that are being combined
to deliver various services of computing. The cloud keeps the services for delivery of …

Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model

S Amanlou, MK Hasan, KAA Bakar - Computer Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) has converged with Cloud computing to provide
comprehensive services to users in different places. However, with the exponential growth of …

A novel image cryptosystem using gray code, quantum walks, and henon map for cloud applications

B Abd-El-Atty, M ElAffendi, AAA El-Latif - Complex & Intelligent Systems, 2023 - Springer
Cloud computing plays a vital task in our daily lives, in which an enormous amount of data is
stored daily on cloud storage. The highest priority for cloud data storage is guaranteeing the …

XECryptoGA: a metaheuristic algorithm-based block cipher to enhance the security goals

MS Jawed, M Sajid - Evolving Systems, 2023 - Springer
Cloud computing has become a pivotal component of all digital organizations and its
adoption poses many security concerns for organizations' data and stakeholders. Data …

Enhancing multi‐tenancy security in the cloud computing using hybrid ECC‐based data encryption approach

P Kumar, A Kumar Bhatt - IET Communications, 2020 - Wiley Online Library
In this study, elliptic curve cryptography (ECC) is elected for tenant authentication, data
encryption, and data decryption due to its minimum key size. The proposed ECC‐based …

A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud

AK Singh, A Nayyar, A Garg - Multimedia Tools and Applications, 2023 - Springer
With the increased number of smart devices in IoT and cloud, communication messages are
exchanged extensively throughout the network. This requires secure data transfer between …

An intelligent outlier detection with machine learning empowered big data analytics for mobile edge computing

RF Mansour, S Abdel-Khalek, I Hilali-Jaghdam… - Cluster …, 2023 - Springer
In recent times, the Internet of Things and big data analytics have become a hot research
topic in mobile edge computing (MEC) desires wide-ranging research works for intelligent …

Heart disease data based privacy preservation using enhanced ElGamal and ResNet classifier

VB Charles, D Surendran, A SureshKumar - Biomedical Signal Processing …, 2022 - Elsevier
Heart disease is increasing, and their detection is a significant concern. With the several
technologies developed, the approaches for detection mechanisms can be improved further …

Cloud computing platform: Performance analysis of prominent cryptographic algorithms

A Ajmal, S Ibrar, R Amin - Concurrency and Computation …, 2022 - Wiley Online Library
With advancements in science and technology, cloud computing is the next big thing in the
industry. Cloud cryptography is a technique that uses encryption algorithms to secure data …

HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment

PH Kumar, GS AnandhaMala - The Journal of Supercomputing, 2023 - Springer
Individuals and IT organizations have begun to profit from cloud providers such as Amazon
Web Services, Google Cloud Platform, Microsoft Azure, and others based on their demand …