Privacy-Preserving Data in IoT-based Cloud Systems: A Comprehensive Survey with AI Integration

D Dhinakaran, SM Sankar, D Selvaraj… - arXiv preprint arXiv …, 2024 - arxiv.org
As the integration of Internet of Things devices with cloud computing proliferates, the
paramount importance of privacy preservation comes to the forefront. This survey paper …

An effective cloud computing model enhancing privacy in cloud computing

M Chawki - Information Security Journal: A Global Perspective, 2024 - Taylor & Francis
Cloud computing revolutionizes global software, system, infrastructure, and storage
accessibility, offering flexibility and cost-effectiveness. This paper explores the pivotal …

Enhancement of Security in Cloud Computing Using Optimal Risk Access Control Model

AR Arunarani, CS Shibi, N Kanimozhi… - … and Smart Electrical …, 2023 - ieeexplore.ieee.org
This paper develops an Optimal Risk Access Control Model (ORACM) for enhancing
security in cloud computing. In this proposed model, three important risk aspects are …

[PDF][PDF] Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management.

S Poorani, R Anitha - KSII Transactions on Internet & Information Systems, 2023 - itiis.org
With the growing adoption of cloud-based technologies, maintaining the privacy and security
of cloud data has become a pressing issue. Privacy-preserving encryption schemes are a …

The Future of Public Administration: Adapting to New Challenges and Opportunities in the 21st Century

I Suryadi - Public Studies and Business Administration Journal …, 2024 - ppipbr.com
The future of public administration in the 21st century is closely linked to the changes and
opportunities brought by technological advances, changing societal needs, and global …

Research on Service Governance Security Based on Federated Mechanism

K Che, S Sheng, T Zhang… - 2023 5th International …, 2023 - ieeexplore.ieee.org
Federated learning can achieve the goal of parameter sharing without sharing training data,
and has the advantages of data isolation, quality assurance, equal status of each parameter …

Evaluation of Regional Drought Evolution and Regularity Based on Cloud Computing Model and Copula Function

R Zhang - … Conference on Network, Multimedia and Information …, 2023 - ieeexplore.ieee.org
Drought is a natural disaster that seriously affects agricultural production and ecological
environment. This article studied the evolution and patterns of regional drought based on …

Data Security Design in Computer Application Software Development from the Perspective of Information Security Environment

Q Jie - Proceedings of the First International Conference on …, 2024 - eudl.eu
Abstract Information security plays a vital role in computer application software development.
With the advent of the digital age, a large amount of sensitive information is stored and …

Privacy Violation in the Cloud Computing Environment: Challenges and Coping Mechanisms

F Rajallah Aljamei… - … Online Journal of …, 2022 - european-science.com
Cloud computing is a fertile environment for both organizations and individual users.
However, this makes it also a fertile environment for violating the privacy of individuals …

Protecting research on data scarcity

Z Zhang, W Sun, T Ding, W Du… - … Conference on Electronic …, 2024 - spiedigitallibrary.org
This article conducts research on the protection of data scarcity in various forms and
proposes a practical approach. This method involves the creation of a novel data model …