Optimized key generation-based privacy preserving data mining model for secure data publishing

YR Kulkarni, B Jagdale, SR Sugave - Advances in Engineering Software, 2023 - Elsevier
The data from the mobile devices and internet services plays a significant role now a day.
The information shared needs to be original to get the best solution. Without the utilization of …

Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing

K Sasikumar, S Nagarajan - IEEE Access, 2024 - ieeexplore.ieee.org
Cloud computing is a fast-growing industry that offers various online services, including
software, computing resources, and databases. Its payment model is usage-based, whereas …

A novel model to enhance the data security in cloud environment

G Verma, S Kanrar - Multiagent and Grid Systems, 2022 - content.iospress.com
Nowadays cloud computing has given a new paradigm of computing. Despite several
benefits of cloud computing there is still a big challenge of ensuring confidentiality and …

Privacy Preserving Data Sharing in Cloud Using EAE Technique

NJ Kumar, KV Vinisha… - … on Recent Trends in …, 2022 - ieeexplore.ieee.org
Accessing and controlling data on the cloud is a low-cost method of ensuring data security.
However, in cloud storage systems with untrusted cloud servers, data storage and retrieval …

Symmetric key and polynomial-based key generation mechanism for secured data communications in 5G networks

S Pradeep, S Muthurajkumar, S Ganapathy, A Kannan - Soft Computing, 2024 - Springer
Fifth Generation (5G) networks provide data communications through various latest
technologies including Software Defined Networks (SDN), Artificial Intelligence, Machine …

A new cryptosystem for secured data communications in plagiarism checking process using blockchain technology

S Anirudh, R Shaan Sundar, S Ganapathy - Wireless Personal …, 2023 - Springer
Blockchain technology is playing a major role in the process of providing security to the data
of different kinds of applications. This technology is considered the verified document of …

An Effective Data Security Mechanism for Secured Data Communications Using Hybrid Cryptographic Technique and Quantum Key Distribution

J Sivakumar, S Ganapathy - Wireless Personal Communications, 2023 - Springer
One of the most flamboyant technological novelties of today's world is cloud computing,
which has been fuelled by the increase in the number of smart devices across the internet …

[PDF][PDF] A New Security Mechanism for Secured Communications Using Steganography and CBA

AA AB, A Gupta, S Ganapathy - ECTI Transactions on Computer …, 2022 - thaiscience.info
Article information: The quick advancement of computerized information trade has caused
data security to be of much significance in information transmission. As a huge measure of …

[PDF][PDF] Dictionary based arabic text compression and encryption utilizing two-dimensional random binary shuffling operations.

A Al-Jarrah, M Al-Jarrah, A Albsharat - Int. Arab J. Inf. Technol., 2022 - ccis2k.org
This paper developed Arabic text encryption and compression based on dictionary indexing
algorithm. The proposed algorithm includes encoding the Arabic text utilizing Arabic words …

Blockchain assisted AHMFA authentication in employee performance assessment system

R Vignesh, K Mohana Prasad - Multimedia Tools and Applications, 2024 - Springer
The concept of blockchain has attained more attention recently to promote secured
encryption and decryption, especially in industrial explorations and research institutions …