[HTML][HTML] Blockchain-based model for incentivized cyber threat intelligence sharing
Sharing cyber threat intelligence (CTI) can significantly improve the security of information
technology (IT) in organizations. However, stakeholders and practitioners are not keen on …
technology (IT) in organizations. However, stakeholders and practitioners are not keen on …
Enhancing cloud storage security through blockchain-integrated access control and optimized cryptographic techniques
RS Kanakasabapathi, JE Judith - International Journal of …, 2024 - search.proquest.com
In the ever-changing landscape of technological innovation and the growing security
concerns associated with cloud storage, this research focuses on the critical topic of …
concerns associated with cloud storage, this research focuses on the critical topic of …
Secure Keyword Search over Encrypted Cloud Data Using Blockchain in Digital Document Sharing
G Verma, S Kanrar - Wireless Personal Communications, 2024 - Springer
Due to the drawbacks of the many-to-many search model for accessing digital records in
institutional settings like offices, hospitals, and government agencies, the paper proposes a …
institutional settings like offices, hospitals, and government agencies, the paper proposes a …
[CITATION][C] Evaluating the impact of cloud computing on accounting firms: A review of efficiency, scalability, and data security
A data security protection method for the Internet of Things based on secret key aggregation and ciphertext attribute encryption
Y Tang, G He - Journal of Cyber Security Technology, 2024 - Taylor & Francis
This study addresses data security challenges in the Internet of Things by proposing a novel
protection method that integrates secret key aggregation and ciphertext attribute encryption …
protection method that integrates secret key aggregation and ciphertext attribute encryption …
A Framework Based on the DAO and NFT in Blockchain for Electronic Document Sharing.
L Chen, J Zhu, Y Xu, H Zheng… - … -Computer Modeling in …, 2024 - search.ebscohost.com
In the information age, electronic documents (e-documents) have become a popular
alternative to paper documents due to their lower costs, higher dissemination rates, and …
alternative to paper documents due to their lower costs, higher dissemination rates, and …
Security enhancement of decentralized healthcare system by transformer blockchain mechanism
A Goel, S Neduncheliyan - Engineering and Applied Science …, 2024 - ph01.tci-thaijo.org
Medical data plays an essential role in diagnosing diseases and planning therapeutic.
However, securing these data is a very critical function in the healthcare system. Some of the …
However, securing these data is a very critical function in the healthcare system. Some of the …
Load balancing model for cloud environment using swarm intelligence technique
G Verma, S Kanrar - Multiagent and Grid Systems, 2023 - content.iospress.com
A distributed system with a shared resource pool offers cloud computing services. According
to the provider's policy, customers can enjoy continuous access to these resources. Every …
to the provider's policy, customers can enjoy continuous access to these resources. Every …
Secure cloud storage access framework using blockchain technology
A Kumar, G Verma - 2023 11th International Conference on …, 2023 - ieeexplore.ieee.org
Data is often stored as ciphertext on cloud servers to maintain privacy and security. A third-
party access key and intervention are required if a data user wants to access encrypted data …
party access key and intervention are required if a data user wants to access encrypted data …
Towards Securing the Digital Document Using Blockchain Technology with Off-Chain Attribute Based Encryption Framework
In digital document security, safeguarding against unauthorized access and tampering is
crucial. This paper introduces a pioneering method to bolster digital document security by …
crucial. This paper introduces a pioneering method to bolster digital document security by …