Security and privacy in big data life cycle: a survey and open challenges

J Koo, G Kang, YG Kim - Sustainability, 2020 - mdpi.com
The use of big data in various fields has led to a rapid increase in a wide variety of data
resources, and various data analysis technologies such as standardized data mining and …

Trusted Third Party Application in Durable Medium e-Service

G Bazydło, K Kozdrój, R Wiśniewski, A Bhattacharjya - Applied Sciences, 2023 - mdpi.com
The paper presents a novel concept of applying a trusted third party (TTP) to the blockchain-
based electronic service (e-service) in the form of a durable medium. The main aim of the …

Vehicle to vehicle data transfer and communication using LI-FI technology

R Anbalagan, MZ Hussain, D Jayabalakrishnan… - Materials Today …, 2021 - Elsevier
The concept of Vehicle to vehicle data transmission refers to the communication between
two vehicles that ensures safety and security of the vehicle occupants. In this project, we …

Study on encryption methods to secure the privacy of the data and computation on encrypted data present at cloud

HR Nagesh, L Thejaswini - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Technology is evolving at a greater speed, day-by-day various health monitoring devices
are invented. Remotely monitored health data should reach the doctors to diagnose the …

Authentication model for secure data access using blowfish and elliptic curve diffie hellman key exchange algorithm

E Padma, CK Gomathy - AIP Conference Proceedings, 2024 - pubs.aip.org
Computer plays a vital role in today's science & technology area. The majority of
organizations computerized their information and managed the data efficiently for a longer …

A novel data sharing model for cloud environment using dual key authentication

G Mamidisetti, R Makala - International Journal of Cloud …, 2020 - inderscienceonline.com
In the present world scenario, cloud computing plays a significant role in sharing of data
between computing devices in a secure manner. Specifically, data sharing amongst …

[PDF][PDF] Comparative Analysis of Data Security and Cloud Storage Models Using NSL KDD Dataset

D Parkash, S Mittal - core.ac.uk
Cloud computing is becoming increasingly important in many enterprises, and researchers
are focusing on safeguarding cloud computing. Due to the extensive variety of service …

A primer on intelligent defense mechanism to counter cloud silent attacks

FD Mukoko, V Thada - 2018 3rd International Conference on …, 2018 - ieeexplore.ieee.org
Cloud security is a key to both Cloud clients and vendors, and this has prodded intensified
massive research around this domain. The contractual continuous Cloud security research …

De-duplication Approach with Enhance Security for Integrity

MB Pokale, SM Chaware - 2018 Fourth International …, 2018 - ieeexplore.ieee.org
Cloud computing becomes one of the important part of the IT-enterprise. It delivers
computing application, software, hardware and computing resources to the user. So many …

[PDF][PDF] PRIVACY-PRESERVING IN CLOUD COMPUTING FOR DATA STORAGE SECURITY FRAMEWORK USING REGENERATING HOMOMORPHIC ENCRYPTION

B Anantharam, N Sharma, BK Rani - academia.edu
As the next generation of computing technology, as per customer demand and
requirements, cloud computing offers the flexibility to dynamically add new resources and …