Web applications, which dominate the internet, act as communication media between customers and service providers. Web applications are an internet innovation that provide …
Outsourcing data to the cloud can be considered as a perfect solution for the storage and computationally constrained data owners. However, data confidentiality is compromised …
S Funde, G Swain - IEEE Access, 2022 - ieeexplore.ieee.org
The concept of big data security is introduced in this article along with many features. It illustrates the need for security in healthcare systems as the volume of data increases …
W Almobaideen, H Jarboua… - International Journal of …, 2020 - inderscienceonline.com
While the world is developing rapidly, cloud security becomes the main concern of the era, especially when dealing with big data and different environments. Users and different …
Database security alludes to keeping unauthorized users from getting into the data set and to its core whether it is incidental or purposeful. Accordingly, every one of the organizations …
A Rath, W Codenie, A Hristoskova - … 2020, USDAI 2020, and WAISE 2020 …, 2020 - Springer
In view of deriving business value from their (product) data, organisations need to adopt the right method and technology to analyse these data to infer new insights and business …
The right to privacy is the most fundamental right of a citizen in any country. Electronic Health Records (EHRs) in healthcare has faced problems with privacy breaches, insider …
I Mori, T Hirano, Y Nakamura… - … Conference on Mobile …, 2021 - ieeexplore.ieee.org
In the searchable encryption, searching encrypted data is slow, compared to searching non- encrypted data. As a solution, there is an acceleration method that discloses a small portion …