Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities

A Kumar, SB Khan, SK Pandey, A Shankar… - Journal of Cloud …, 2023 - Springer
Cloud computing is the most recent smart city advancement, made possible by the
increasing volume of heterogeneous data produced by apps. More storage capacity and …

Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review

A Majeed - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Anonymization techniques are widely used to make personal data broadly available for
analytics/data-mining purposes while preserving the privacy of the personal information …

A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm

G Sugitha - Peer-to-Peer Networking and Applications, 2024 - Springer
Maximizing the security of the cloud system is most important need of this world. Similarly,
the data controllers are also increased stealing the sensitive and personal data from the …

Artificial lizard search optimized fuzzy logic approach to addressing authentication and data security challenges in P2P cloud environments

BJ Chelliah - Computers & Security, 2023 - Elsevier
The cloud is a widely used technology for inter-organizational data exchange and managing
digital information. Even though it offers significant potential for user convenience it is …

Hybrid Quantum Computing and Decision Tree-Based Data Mining for Improved Data Security

K Sudharson, NS Usha, G Babu… - 2023 7th …, 2023 - ieeexplore.ieee.org
Data mining and quantum computing have become potent methods for analyzing massive
datasets and gaining insightful conclusions. However, conventional techniques for data …

Threats in Cloud Computing System and Security Enhancement

MKH Al-Dulaimi, AM Al-Dulaimi… - … 35th Conference of …, 2024 - ieeexplore.ieee.org
Background: Cloud computing (CC) is a disruptive computing paradigm that uses networked
systems, notably the Internet, to provide shared resources and services. Its use has been …

Artificial lizard search optimized fuzzy logic approach to addressing authentication and data security challenges in P2P cloud environments

J Flavia B, BJ Chelliah - 2023 - dl.acm.org
The cloud is a widely used technology for inter-organizational data exchange and managing
digital information. Even though it offers significant potential for user convenience it is …

A Detailed Study on Security and Privacy Analysis and Mechanisms in Cloud Computing

K Sukeerthi, R Kesavan… - … Conference on Research …, 2023 - ieeexplore.ieee.org
When it comes to delivering IT services to businesses or consumers, the cloud provides a
scalable, reliable, and cost-effective option. However, there is an increased risk associated …

Wireless Sensor Networks Consistent and Honest Routing Scheme

A Vijayaraj, B Reethika, K Santhiya… - 2023 International …, 2023 - ieeexplore.ieee.org
A key concern in large-scale dense wireless sensor networks is the efficient usage of energy
(WSNs). There is a better likelihood of redundant data due to more number of nodes within …

Organic and Recyclable Waste Classification Using Integrated Feature Selection Method

A Vijayaraj, S Shreya, G Deepana… - 2023 International …, 2023 - ieeexplore.ieee.org
This paper suggests a new approach to enhancing waste classification performance using
deep learning algorithms. Specifically, the proposed approach integrates an autoencoder …