[HTML][HTML] Blockchain-based model for incentivized cyber threat intelligence sharing

A Venčkauskas, V Jusas, D Barisas, B Misnevs - Applied Sciences, 2024 - mdpi.com
Sharing cyber threat intelligence (CTI) can significantly improve the security of information
technology (IT) in organizations. However, stakeholders and practitioners are not keen on …

Enhancing cloud storage security through blockchain-integrated access control and optimized cryptographic techniques

RS Kanakasabapathi, JE Judith - International Journal of …, 2024 - search.proquest.com
In the ever-changing landscape of technological innovation and the growing security
concerns associated with cloud storage, this research focuses on the critical topic of …

Secure Keyword Search over Encrypted Cloud Data Using Blockchain in Digital Document Sharing

G Verma, S Kanrar - Wireless Personal Communications, 2024 - Springer
Due to the drawbacks of the many-to-many search model for accessing digital records in
institutional settings like offices, hospitals, and government agencies, the paper proposes a …

[CITATION][C] Evaluating the impact of cloud computing on accounting firms: A review of efficiency, scalability, and data security

A Atadoga, UJ Umoga, OA Lottu… - Global Journal …, 2024 - Global Journal of Engineering and …

A data security protection method for the Internet of Things based on secret key aggregation and ciphertext attribute encryption

Y Tang, G He - Journal of Cyber Security Technology, 2024 - Taylor & Francis
This study addresses data security challenges in the Internet of Things by proposing a novel
protection method that integrates secret key aggregation and ciphertext attribute encryption …

A Framework Based on the DAO and NFT in Blockchain for Electronic Document Sharing.

L Chen, J Zhu, Y Xu, H Zheng… - … -Computer Modeling in …, 2024 - search.ebscohost.com
In the information age, electronic documents (e-documents) have become a popular
alternative to paper documents due to their lower costs, higher dissemination rates, and …

Security enhancement of decentralized healthcare system by transformer blockchain mechanism

A Goel, S Neduncheliyan - Engineering and Applied Science …, 2024 - ph01.tci-thaijo.org
Medical data plays an essential role in diagnosing diseases and planning therapeutic.
However, securing these data is a very critical function in the healthcare system. Some of the …

Load balancing model for cloud environment using swarm intelligence technique

G Verma, S Kanrar - Multiagent and Grid Systems, 2023 - content.iospress.com
A distributed system with a shared resource pool offers cloud computing services. According
to the provider's policy, customers can enjoy continuous access to these resources. Every …

Secure cloud storage access framework using blockchain technology

A Kumar, G Verma - 2023 11th International Conference on …, 2023 - ieeexplore.ieee.org
Data is often stored as ciphertext on cloud servers to maintain privacy and security. A third-
party access key and intervention are required if a data user wants to access encrypted data …

Towards Securing the Digital Document Using Blockchain Technology with Off-Chain Attribute Based Encryption Framework

S Pandey, V Rishiwal, DS Jat, P Yadav… - … on Emerging Trends …, 2024 - ieeexplore.ieee.org
In digital document security, safeguarding against unauthorized access and tampering is
crucial. This paper introduces a pioneering method to bolster digital document security by …