J Li, X Zhang, W Shi - Electronics, 2022 - mdpi.com
In the Internet of Things (IoT) system, data leakage can easily occur due to the differing security of edge devices and the different processing methods of data in the transmission …
SM Basha, V Rishik, VJN Krishna… - 2023 International …, 2023 - ieeexplore.ieee.org
This research study gives an overview on cloud security to understand the security concerns and solutions. The internet has revolutionised how people live and work, and cloud …
Cryptographic key generation and data encryption and decryption using wearable biometric technologies is an emerging research area with significant potential for authentication and …
Cloud computing has gained widespread adoption in enterprises due to its on-demand service, broad network access, and elasticity. However, security issues make it difficult to …
Isha, M Saxena, CK Jha - … for Security Applications: Proceedings of ICSCS …, 2022 - Springer
Abstract The Internet of things (IoT) is a worldwide network of objects equipped with controllers, sensors, and software that can collect, process, and exchange data, and whose …
JT Amael, JE Istiyanto, Z Hakim, RH Sari… - 2024 IEEE 33rd …, 2024 - ieeexplore.ieee.org
The development of Industry 4.0 technologies like IoT and Big Data has improved healthcare efficiency but also raised security risks for medical devices such as ventilators …
E Elumalai, D Muruganandam - Bulletin of Electrical Engineering and …, 2024 - beei.org
Cloud computing rapidly is a prerequisite and releases resources with minimal management effort. The surfacing of the cloud has significantly distorted the general insight into …
S Suryawanshi, Y Mhaskar… - 2023 International …, 2023 - ieeexplore.ieee.org
It is critical in today's data-centric world to ensure the privacy and security of video data preserved in the cloud. This investigation looks at the issues of securing video data in cloud …
MD Abdul-Jabbar - Iraqi Journal of Science, 2023 - ijs.uobaghdad.edu.iq
Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly …