SSII: secured and high-quality steganography using intelligent hybrid optimization algorithms for IoT

S Dhawan, C Chakraborty, J Frnda, R Gupta… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is a domain where the transfer of big data is taking place every single
second. The security of these data is a challenging task; however, security challenges can …

Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems

R Denis, P Madhubala - Multimedia Tools and Applications, 2021 - Springer
The exponential rise in the development of cloud computing environments in the healthcare
field, the protection and confidentiality of the medical records become a primary concern for …

Current and Future Trends of Cloud-based Solutions for Healthcare

S Harnal, G Sharma, S Malik, G Kaur, S Simaiya… - Image Based Computing …, 2023 - Springer
Cloud computing provides an environment to share computing resources like servers,
programs, and infrastructure. As cost of technology increases in updating of hardware and …

Enhancing hybrid encryption techniques for secured data processing for small medium enterprises in cloud

M Goyal, A Sharma - … , and Innovation for Betterment of Society …, 2021 - ieeexplore.ieee.org
Cloud computing is a promising area in the field of Information Technology. Nowadays, a
good amount of fast, advanced and demanding technologies are available in cloud …

Simulation of e-learning visualization technology based on image enhancement in the communication mode of public performance art videos

W Xu - Entertainment Computing, 2024 - Elsevier
With the simulation of public performing arts video communication modes, this study aims to
explore the application of image-enhanced electronic learning visualization techniques in …

Efficient and flexible role-based access control (EFRBAC) mechanism for cloud

S Harnal, RK Chauhan - EAI Endorsed Transactions on …, 2020 - publications.eai.eu
The cloud reduces the user's burden to many folds. But cloud providers and cloud users with
dynamic relationship, are in distinct security domains. Amongst various challenges with …

Towards secure, flexible and efficient role based hospital's cloud management system: case study

S Harnal, RK Chauhan - EAI Endorsed Transactions on Pervasive Health …, 2020 - eudl.eu
INTRODUCTION: Many organizations of health care have recognized that quality of service
can be improved by maintaining e-records of patient's reports, medical histories, surgeries …

[PDF][PDF] Increasing data secrecy in cloud by implementing image cryptography

PV Lahande, PR Kaveri - International Journal of Scientific and …, 2020 - academia.edu
Cloud provides an easy platform for users for the purpose of accessing and storing data from
anywhere using the internet. Hence in spite the data being private, sensitive as well as …

[PDF][PDF] Securing the Cloud Storage by Using Different Algorithms of Cryptography

M Jan, Q Shahzad, S Afsar - Int. J. Sci. Res. in Computer Science …, 2022 - researchgate.net
Accepted: 02/Apr/2022, Online: 30/Apr/2022 Abstract—Cloud Computing offers services via
the internet that allows for virtual servers, dynamic memory pools, as well as easy access …

Applications and challenges for sustainable development with cloud/fog/edge computing

G Kaur, S Harnal, A Goyal, R Tiwari… - Cloud and Fog …, 2024 - taylorfrancis.com
Cloud computing, edge computing, and fog computing are three distinct computing
paradigms that have emerged in response to the growing demand for distributed computing …