[PDF][PDF] A review on data security in cloud computing

AA Soofi, MI Khan, FE Amin - International Journal of Computer …, 2017 - academia.edu
Cloud computing is an Internet-based computing and next stage in evolution of the internet.
It has received significant attention in recent years but security issue is one of the major …

EELC: Energy-efficient lightweight cryptography for IoT networks

G Rajesh, XM Raajini, KM Sagayam… - Security and Privacy …, 2021 - Elsevier
The highly demand concerns in cybersecurity is preventing unknowns, which evolve from
time to time. Internet of Things (IoT) deployments can enable the real-time monitoring and …

[PDF][PDF] Cryptography based techniques of encryption for security of data in cloud computing paradigm

A Rajab, S Aqeel, MS Al Reshan, A Ashraf… - Int. J. Eng. Trends …, 2021 - researchgate.net
Cloud Computing (CC) is a cheap and userfriendly compatible platform that aims to provide
IT users over the internet to a business organization as well as another internet consumer by …

Energy optimised cryptography for low power devices in internet of things

G Rajesh, CV Krishna, BC Selvaraj… - … Journal of High …, 2018 - inderscienceonline.com
Internet of things has a plethora of devices ranging from high capacity servers to low
powered devices that works with Bluetooth, ZigBee, GPRS, RFID, Wi-Fi, etc. These low …

Cloud Privacy and Security-A Review Paper

S Kumar, S Gupta, AV Singh - 2023 5th International …, 2023 - ieeexplore.ieee.org
Distributed computing hosts and conveys various administrations through internet there are
a great deal of reasons why individuals settle on utilizing cloud assets cloud improvement is …

[PDF][PDF] Securing the Cloud: A Critical Appraisal of Data Security Strategies

MY MP, S Kulkarni - researchgate.net
Cloud computing, a paradigm shift in the evolution of the internet, has garnered significant
attention. However, security remains a primary concern, hindering its widespread adoption …

[PDF][PDF] An investigation on the techniques used for encryption and authentication for data security in cloud computing

T Rajamani, P Sevugan, S Purushotham - IIOABJ, 2016 - iioab.org
SUBJECT CLASSIFICATION (Example: RNOMICS) Page 1 SPECIAL ISSUE (SCMDSA)
Rajamani et al …

Layered storage architecture for health system using cloud

B Balamurugan, RL GV, S Kumar - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Cloud computing is a paradigm shift from traditional computing offers services that can use
ubiquitous internet to transmit data and other functionalities. The health care plays a vital …

Securing big data in the cloud by protected mapping over multiple providers

C Rong, H Cheng, MG Jaatun - 2016 Digital Media Industry & …, 2016 - ieeexplore.ieee.org
The Cloud is increasingly being used to store and process big data, and conventional
security mechanisms using encryption are either not sufficiently efficient or not suited to the …

[PDF][PDF] Local data security through encryption

B Vyas, A Vajpayee - International Journal of Computer Trends …, 2017 - researchgate.net
In recent years there is drastic progress in the Internet world. Sensitive information can be
shared through internet but this information sharing is susceptible to certain attacks …