[PDF][PDF] Cloud data security and various cryptographic algorithms

Y Alemami, AM Al-Ghonmein… - … Journal of Electrical …, 2023 - researchgate.net
Cloud computing has spread widely among different organizations due to its advantages,
such as cost reduction, resource pooling, broad network access, and ease of administration …

A comprehensive literature of genetics cryptographic algorithms for data security in cloud computing

O Can, F Thabit, AO Aljahdali, S Al-Homdy… - Cybernetics and …, 2023 - Taylor & Francis
Cloud computing has revolutionized the world, opening up new horizons with bright
potential due to its performance, accessibility, low cost, and many other benefits. Cloud …

Securing Digital Images through Simple Permutation‐Substitution Mechanism in Cloud‐Based Smart City Environment

A Alanezi, B Abd-El-Atty, H Kolivand… - Security and …, 2021 - Wiley Online Library
Data security plays a significant role in data transfer in cloud‐based smart cities. Chaotic
maps are commonly used in designing modern cryptographic applications, in which one …

[HTML][HTML] Applying detection leakage on hybrid cryptography to secure transaction information in e-commerce apps

M Al-Zubaidie, GS Shyaa - Future Internet, 2023 - mdpi.com
Technology advancements have driven a boost in electronic commerce use in the present
day due to an increase in demand processes, regardless of whether goods, products …

Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms

F Thabit, O Can, RUZ Wani, MA Qasem… - Concurrency and …, 2023 - Wiley Online Library
Cloud computing (CC) refers to the on‐demand availability of network resources, particularly
data storage and processing power, without requiring special or direct administration by …

A robust security scheme based on enhanced symmetric algorithm for MQTT in the Internet of Things

AJ Hintaw, S Manickam, S Karuppayah… - IEEE …, 2023 - ieeexplore.ieee.org
Message Queuing Telemetry Transport (MQTT) is expected to be the de facto messaging IoT
standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant …

Novel framework based on ensemble classification and secure feature extraction for COVID-19 critical health prediction

R Priyadarshini, AQ Md, S Mohan, A Alghamdi… - … Applications of Artificial …, 2023 - Elsevier
The Covid outbreak necessitated the use of an automated method for treating patients with
critical symptoms. Increasing use of the Internet of Things (IoT) and smart devices requires …

An analytical survey of wsns integration with cloud and fog computing

Q Shaheen, M Shiraz, S Aziz Butt, A Gani, MA Khan - Electronics, 2021 - mdpi.com
Wireless sensor networks (WSNs) are spatially scattered networks equipped with an
extensive number of nodes to check and record different ecological states such as humidity …

[HTML][HTML] Providing security for flash loan system using cryptocurrency wallets supported by XSalsa20 in a blockchain environment

M Al-Zubaidie, WA Jebbar - Applied Sciences, 2024 - mdpi.com
The days of long lines at banks and piles of paperwork are long gone. The lending
landscape has been completely transformed by digital loans, which provide a quick, easy …

Post-quantum cryptography-driven security framework for cloud computing

HC Ukwuoma, G Arome, A Thompson… - Open Computer …, 2022 - degruyter.com
Data security in the cloud has been a major issue since the inception and adoption of cloud
computing. Various frameworks have been proposed, and yet data breach prevails. With …