A new approach for security in cloud data storage for IOT applications using hybrid cryptography technique

A Kumar, V Jain, A Yadav - … in renewable energy and its control …, 2020 - ieeexplore.ieee.org
People store their data on cloud storage very commonly now a day. Security is a major issue
in storing data on clouds. Cryptography techniques are very useful to impose security on …

Analysis of security-based access control models for cloud computing

S Choudhary, N Singh - International Journal of Cloud Applications …, 2022 - igi-global.com
Access control has become the most necessary requirement to limit unauthorized and
privileged access to information systems in cloud computing. Access control models counter …

Impact of information and communication technology in the Indian education system during COVID-19

K Sinha, M PriyaDarshani - … of Research on Library Response to the …, 2021 - igi-global.com
Abstract Knowledge has become power for every nation in the 21st century. Information and
communication become important sources for the transformation of any human civilization …

The Detection of SQL Injection on Blockchain-Based Database

K Sinha, M Verma - … Applications of Blockchain-Enabled Privacy and …, 2021 - igi-global.com
In today's world, the storage of data needs a huge amount of space. Meanwhile, cloud and
distributed environments provide sufficient storage space for the data. One of the …

A study on evolutionary technique to predict the sales during COVID-19

M PriyaDarshani, MP Sinha, K Sinha - Handbook of Research on …, 2021 - igi-global.com
COVID-19 has affected the growth of every industry; in the meantime, an enormous amount
of demand is present in the field of telecom and automobiles. In this chapter, the authors …

Automated Detection of SQL Injection Attack on Blockchain-Based Database

K Sinha, AK Keshari - Handbook of Research on Library Response …, 2021 - igi-global.com
In the era of computing, where the data are stored in a cloud or distributed environment, the
privacy of data is one of the challenging tasks. The attacks like denial of service attacks …

A Study on Supervised Machine Learning Technique to Detect Anomalies in Networks

K Sinha - Handbook of Research on Library Response to the …, 2021 - igi-global.com
During this time, COVID-19 has affected the lifestyles of many individuals; in the meantime,
an enormous amount of users are connected with the internet. This will also increase the …

[PDF][PDF] Network Intrusion Detection Using Wireshark and Machine Learning

D Chandravathi, P Praneeth, A Sakina… - International Journal …, 2024 - journalspub.com
The growth of networked devices has highlighted the desire for advanced intrusion detection
(IDS) tools to protect digital systems from evolving cyber threats. Traditional IDS systems are …

Fortifying Data Security in the Evolving Digital Landscape: Challenges and Solutions

N Srivastava, H Sharma, A Maliyal… - … of Research on …, 2024 - igi-global.com
Data security presents significant concerns for organizations and individuals in today's
evolving digital landscape. Prominent challenges include sophisticated cyberattacks, remote …

An Efficient Approach for Sending Identification Bit With the Help of Blowfish-RC6

K Patidar, DP Tiwari, P Sharma… - … of Research on …, 2023 - igi-global.com
This chapter used an efficient mechanism based on blowfish and the RC6 (BRC6) algorithm
for better security against cross-site scripting (XSS) attacks. The data types covered in this …