A comprehensive literature of genetics cryptographic algorithms for data security in cloud computing

O Can, F Thabit, AO Aljahdali, S Al-Homdy… - Cybernetics and …, 2023 - Taylor & Francis
Cloud computing has revolutionized the world, opening up new horizons with bright
potential due to its performance, accessibility, low cost, and many other benefits. Cloud …

Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree

S Dalal, UK Lilhore, N Faujdar, S Simaiya… - Journal of Cloud …, 2023 - Springer
Billions of gadgets are already online, making the IoT an essential aspect of daily life.
However, the interconnected nature of IoT devices also leaves them open to cyber threats …

Ensuring privacy and confidentiality of cloud data: A comparative analysis of diverse cryptographic solutions based on run time trend

JK Dawson, T Frimpong, JB Hayfron Acquah… - Plos one, 2023 - journals.plos.org
The cloud is becoming a hub for sensitive data as technology develops, making it
increasingly vulnerable, especially as more people get access. Data should be protected …

Advancing cloud image security via AES algorithm enhancement techniques

ZA Mohammed, HQ Gheni, ZJ Hussein… - … , Technology & Applied …, 2024 - etasr.com
Communication system and internet dominance in our society, has made image security a
matter of paramount concern. Cryptography involves encrypting data to protect information …

Challenges and Opportunities in Smart City Network Management Through Blockchain and Cloud Computing

J Pires, VK Shukla, L Wanganoo… - … and Future Directions, 2023 - Wiley Online Library
With the idea of new developing technologies and the rapid change in our technical
environment, there is a need for smarter, more efficient technology to keep up with the needs …

Driving Technologies of Industry 5.0 in the Medical Field

S Dalal, B Seth, M Radulescu - … 5.0: An Organizational Model for Twin …, 2023 - emerald.com
Customers today expect businesses to cater to their individual needs by tailoring the
products they purchase to their own preferences. The term “Industry 5.0” refers to a new …

Adaptive scheduling algorithm based task loading in cloud data centers

D Mukherjee, S Ghosh, S Pal, AA Aly, DN Le - IEEE Access, 2022 - ieeexplore.ieee.org
Cloud computing is a global storage framework whereby users use the tools, including the
computation, storage, network, etc., that are provided automatically. The computational has …

Design of internet of things service system for logistics engineering by using the blockchain technology

A Shen - International journal of grid and utility computing, 2023 - inderscienceonline.com
With the rapid progress of information technology, the application of the Internet of things
(IoT) technology has become more common, which also brings greater challenges to the IoT …

Identification Of Better Encryption Algorithm in Securing Data

SJ Sabeena, S AntelinVijila - Journal of Survey in Fisheries …, 2023 - sifisheriessciences.com
Over the last few years, the usage of the internet has grown considerably in many fields.
Data security has become the biggest challenge due to the wide spread usage of the …

[PDF][PDF] Optimized application of artificial intelligence (AI) in aviation market.

M Kumar - International Journal of Recent Research Aspects, 2022 - ijrra.net
Businesses may now communicate with their consumers in new ways, make new strategic
decisions, and create new workflows thanks to technological advancements. Things like …