FogIoHT: A weighted majority game theory based energy-efficient delay-sensitive fog network for internet of health things

A Mukherjee, D De, SK Ghosh - Internet of Things, 2020 - Elsevier
Abstract Internet of Health Things (IoHT) has become a demanding application of Internet of
Things and cloud computing. In IoHT, the exchange and processing of health data are …

Network security in cloud computing with elliptic curve cryptography

VO Waziri, JA Ojeniyi, D Hakimi, I Audu, SM Abubakar… - 2013 - ir.futminna.edu.ng
This paper researches on cloud computing based-on authentication for the security
verification using Elliptic Curve Digital Signature Algorithm (ECDSA). The study structure …

An effective hybrid encryption algorithm for ensuring cloud data security

V Goyal, C Kant - Big data analytics: Proceedings of CSI 2015, 2018 - Springer
Cloud computing is one of the most research hot topics in IT industry nowadays. A lot of
startup organizations are adopting cloud eagerly due to massive cloud facilities available …

Authentication and encryption in cloud computing

JP Singh, S Kumar - 2015 International conference on smart …, 2015 - ieeexplore.ieee.org
Cloud Computing is becoming increasingly popular day by day. If the security parameters
are taken care properly many enterprises and government agencies will move into cloud …

Data encryption framework model with watermark security for data storage in public cloud model

D Boopathy, M Sundaresan - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
Cloud computing technology is a new concept of providing dramatically scalable and
virtualized resources. It implies a SOA (Service Oriented Architecture) type, reduced …

A novel key management protocol for vehicular cloud security

N Hegde, SS Manvi - … Computing Electronics and Control), 2019 - telkomnika.uad.ac.id
Vehicular cloud computing (VCC) is a new hybrid technology which has become an
outstanding area of research. VCC combines salient features of cloud computing and …

Enhancing security of cloud computing by using RC6 encryption algorithm

SA Abbas, MQ Mohammed - International Journal of Applied Information …, 2017 - ijais.org
Cloud computing give an impression of being an extremely well known and famous
computing technology. Each person is utilizing cloud computing straightforwardly or …

Data security and encryption technique for cloud storage

S Kumar, J Shekhar, JP Singh - Cyber Security: Proceedings of CSI 2015, 2018 - Springer
In the last few years, we have seen that cloud computing model has been developed as a
promising business model of the fastest growing IT sector. Most of the IT companies …

Improved data storage confidentiality in cloud computing using identity-based cryptography

H Guesmi, LA Saïdane - 2017 25th international conference on …, 2017 - ieeexplore.ieee.org
This paper addresses the users' need to trust the commercial cloud providers and the
security issues related to data storage in a cloud storage service. The cloud storage is one of …

Fog–driven healthcare framework for security analysis

S Parasuraman, AK Sangaiah - … Intelligence for Multimedia Big Data on the …, 2018 - Elsevier
Motivation: Chronic diseases such as stroke, diabetes, cancer, kidney disease, and heart
disease are steadily increasing day-to-day. Providing proper precautions on time is needed …