Cybersecurity in the AI-Based metaverse: A survey

M Pooyandeh, KJ Han, I Sohn - Applied Sciences, 2022 - mdpi.com
The Metaverse is a multi-user virtual world that combines physical reality with digital virtual
reality. The three basic technologies for building the Metaverse are immersive technologies …

Smart contract-enabled secure sharing of health data for a mobile cloud-based e-health system

P Chinnasamy, A Albakri, M Khan, AA Raja, A Kiran… - Applied Sciences, 2023 - mdpi.com
Healthcare comprises the largest revenue and data boom markets. Sharing knowledge
about healthcare is crucial for research that can help healthcare providers and patients …

Systematic survey: secure and privacy-preserving big data analytics in cloud

A Amaithi Rajan, VV - Journal of Computer Information Systems, 2024 - Taylor & Francis
Massive data are being generated exponentially every day. Therefore, analytics over data is
inevitable nowadays to gain meaningful insights. Big Data Analytics (BDA) is powerful in …

A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications

Z Wenhua, MK Hasan, NB Jailani, S Islam… - Computers in Human …, 2024 - Elsevier
Telehealth, a cornerstone of Healthcare 4.0 has widespread adoption owing to its
convenience and efficiency. However, the secure transmission of patient records over the …

Secured and privacy-preserving multi-authority access control system for cloud-based healthcare data sharing

R Gupta, P Kanungo, N Dagdee, G Madhu, KS Sahoo… - Sensors, 2023 - mdpi.com
With continuous advancements in Internet technology and the increased use of
cryptographic techniques, the cloud has become the obvious choice for data sharing …

A K-SVD based compressive sensing method for visual chaotic image encryption

Z **e, J Sun, Y Tang, X Tang, O Simpson, Y Sun - Mathematics, 2023 - mdpi.com
The visually secure image encryption scheme is an effective image encryption method,
which embeds an encrypted image into a visual image to realize a secure and secret image …

Dynamic secure access control and data sharing through trusted delegation and revocation in a blockchain-enabled cloud-IoT environment

S Alshehri, O Bamasaq, D Alghazzawi… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is vulnerable to leakage of private information during data
sharing. To avoid this problem, access control and secure data sharing have been …

A security framework to enhance IoT device identity and data access through blockchain consensus model

K Janani, S Ramamoorthy - Cluster Computing, 2024 - Springer
In today's technology landscape, the Internet of Things (IoT) has gained significant
momentum due to its wide-ranging applications across diverse devices. However, the …

Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system

M Jammula, VM Vakamulla, SK Kondoju - Connection Science, 2022 - Taylor & Francis
ABSTRACT Internet of Things (IoT) devices require lower power consumption with higher
security, which can be achieved by using lightweight cryptography (LWC) approaches …

ZEBRA: Zero Trust Architecture Employing Blockchain Technology and ROPUF for AMI Security

F Alsulami, AR Kulkarni, NA Hazari, M Niamat - IEEE Access, 2024 - ieeexplore.ieee.org
Smart grid (SG) has evolved as a recent topic of discussion and research globally, due to the
integration of communication and internet in its network. It facilitates the bidirectional flow of …