Memory Efficient Multi Key (MEMK) generation scheme for secure transportation of sensitive data over Cloud and IoT devices

C Thirumalai, H Kar - 2017 Innovations in Power and …, 2017 - ieeexplore.ieee.org
A new variant of RSA has been proposed called Memory Efficient Multi Key (MEMK)
generation scheme. For sensitive data, our scheme will aid in exchanging the information …

Cloud Computing Security Optimization via Algorithm Implementation

MD Dhabliya - International Journal of New Practices in Management …, 2021 - ijnpme.org
There has been a growing need for significant improvements in cloud computing security? to
ensure that operations and data interactions in the cloud keep abreast with the dynamic …

Isomorphic encryption and coupled ANN with Mealy machine: a cutting edge data security model for cloud computing environment

A Bhowmik, S Karforma - Knowledge and Information Systems, 2023 - Springer
Cloud computing is defined as the distribution of computing including hardware and
software to the consumer through the Internet. In the era of ICT, cloud computing has been …

[PDF][PDF] A secure data classification model in cloud computing using machine learning approach

K Kaur, V Zandu - International Journal of Grid and Distributed …, 2016 - researchgate.net
Cloud computing offers numerous benefits including scalability, availability and many
services. But with its wide acceptance all over the globe, new risks and vulnerabilities have …

[PDF][PDF] ENHANCE DATA SECURITY IN CLOUD COMPUTING USING MACHINE LEARNING AND HYBRID CRYPTOGRAPHY TECHNIQUES.

S Sharma - … journal of advanced research in computer …, 2017 - pdfs.semanticscholar.org
In Cloud computing, the user's can access their important data via internet that is being
stored on the remote servers. As technology is growing day by day, there is a rapid increase …

Security Models of cloud computing using Machine Learning & Network Security Application

M Gundale, A Mishra - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
The paper's objective is to improve cloud security and enhance information literacy levels for
cloud re-appropriation. Since the protection of cloud data is a major concern in cloud re …

Symmetric key and artificial neural network with mealy machine: A neoteric model of cryptosystem for cloud security

A Bhowmik, S Karforma, J Dey - Machine Learning Techniques …, 2021 - Wiley Online Library
Cloud computing is defined as the distribution of computing which include hardware and
software program to the patron through the Internet. In the technology of ICT, cloud …

[PDF][PDF] Upgrade-Data Security in Cloud by Machine Learning and Cryptography Techniques

AA Ahmed, MIT Hussan, V Bollapalli - Int. J. Eng. Adv. Technol, 2019 - academia.edu
The term cloud computing is referred as the shared pool of customizable computer
resources and high quantity services which can easily be provisioned with less …

[PDF][PDF] Hybrid soft computing techniques for enhancement of data privacy on cloud

EOC Mkpojiogu, A Al-Athwari - International J. of Comput. and …, 2020 - researchgate.net
Nowadays, cloud computing serves as an important factor in advanced software for storage
and transferring large data. Cloud-based service providers provide software to their users to …

[PDF][PDF] A cryptographic approach for information distribution by utilizing E-KNN in cloud environment

D Tripathi, R Dhiman - … Journal of Research in Engineering, IT and …, 2018 - indusedu.org
In Cloud computing security of data is still a challenging issue. Various approaches have
been proposed for the security of data in cloud environment. In this research work we …