Medical image encryption: a comprehensive review

ST Ahmed, DA Hammood, RF Chisab, A Al-Naji… - Computers, 2023 - mdpi.com
In medical information systems, image data can be considered crucial information. As
imaging technology and methods for analyzing medical images advance, there will be a …

RETRACTED ARTICLE: An adaptive traffic routing approach toward load balancing and congestion control in Cloud–MANET ad hoc networks

S Dalal, B Seth, V Jaglan, M Malik, Surbhi, N Dahiya… - Soft Computing, 2022 - Springer
It would not be an overstatement to say that Cloud services have exponentially increased
the computing power of mobile devices, enabling operators to undertake complex …

Congestion centric multi‐objective reptile search algorithm‐based clustering and routing in cognitive radio sensor network

D Sunitha, KR Balmuri, RP de Prado… - Transactions on …, 2023 - Wiley Online Library
Abstract In recent trends, Cognitive Radio Sensor Networks (CRSNs) are investigated in‐
depth and getting momentum in all types of applications. CRSN can make use of the …

A secure IoT applications allocation framework for integrated fog-cloud environment

K Dubey, SC Sharma, M Kumar - Journal of Grid Computing, 2022 - Springer
Applications of the Internet of Things (IoT) are used in several areas to create a smart
environment such as healthcare, smart agriculture, smart cities, transportation, and water …

[PDF][PDF] Secure Cloud Data Storage System Using Hybrid Paillier–Blowfish Algorithm.

B Seth, S Dalal, DN Le, V Jaglan, N Dahiya… - … , Materials & Continua, 2021 - academia.edu
Cloud computing utilizes enormous clusters of serviceable and manageable resources that
can be virtually and dynamically reconfigured in order to deliver optimum resource utilization …

Predicting fraud in financial payment services through optimized hyper-parameter-tuned XGBoost model

S Dalal, B Seth, M Radulescu, C Secara, C Tolea - Mathematics, 2022 - mdpi.com
Online transactions, medical services, financial transactions, and banking all have their
share of fraudulent activity. The annual revenue generated by fraud exceeds $1 trillion. Even …

AI for identity and access management (IAM) in the cloud: Exploring the potential of artificial intelligence to improve user authentication, authorization, and access …

SO Olabanji, OO Olaniyi, CS Adigwe… - … , and Access Control …, 2024 - papers.ssrn.com
This comprehensive study explores the integration and effectiveness of Artificial Intelligence
(AI) in Identity and Access Management (IAM) within cloud environments. It primarily focuses …

Homomorphic cryptosystem-based secure data processing model for edge-assisted IoT healthcare systems

HS Trivedi, SJ Patel - Internet of Things, 2023 - Elsevier
The substantial acceptance of Internet-of-Things (IoT) in digital healthcare systems
necessitates secure data processing before storing it on a cloud server. Since resource …

Big data security and privacy in healthcare: A systematic review and future research directions

M Al Zaabi, SM Alhashmi - Information Development, 2024 - journals.sagepub.com
Big data security involves protecting healthcare data from unauthorised use and access and
making any changes, while privacy entails ensuring the confidentiality of individual patient …

A novel image cryptosystem using gray code, quantum walks, and henon map for cloud applications

B Abd-El-Atty, M ElAffendi, AAA El-Latif - Complex & Intelligent Systems, 2023 - Springer
Cloud computing plays a vital task in our daily lives, in which an enormous amount of data is
stored daily on cloud storage. The highest priority for cloud data storage is guaranteeing the …