Integrating encryption techniques for secure data storage in the cloud

B Seth, S Dalal, V Jaglan, DN Le… - Transactions on …, 2022 - Wiley Online Library
Cloud computing has emerged as one of the most groundbreaking technologies to have
redefined the bounds of conventional computing techniques. It has ushered in a paradigm …

Energy-efficient cluster head selection through relay approach for WSN

PS Rathore, JM Chatterjee, A Kumar… - The Journal of …, 2021 - Springer
In the clustering method, the cluster head node loses much energy between transmissions
to the base station, confirming that determining the cluster heads is crucial. A robust …

[PDF][PDF] Secure Cloud Data Storage System Using Hybrid Paillier–Blowfish Algorithm.

B Seth, S Dalal, DN Le, V Jaglan, N Dahiya… - … , Materials & Continua, 2021 - academia.edu
Cloud computing utilizes enormous clusters of serviceable and manageable resources that
can be virtually and dynamically reconfigured in order to deliver optimum resource utilization …

Map matching algorithm: real time location tracking for smart security application

SK Prasad, J Rachna, OI Khalaf… - … and Radio Engineering, 2020 - dl.begellhouse.com
Map matching is an important concept for navigation and tracking application of the
computer science domain. This research work investigates, curve geometry influences the …

A machine learning model for improving virtual machine migration in cloud computing

A Belgacem, S Mahmoudi, MA Ferrag - The Journal of Supercomputing, 2023 - Springer
Cloud Computing is a paradigm allowing access to physical and application resources
online via the Internet. These resources are virtualized using virtualization software to make …

System and method for improving content fetching by selecting tunnel devices

D Shribman, O Vilenski - US Patent 11,190,374, 2021 - Google Patents
H04L69/168—Implementation or adaptation of Internet protocol [IP], of transmission control
protocol [TCP] or of user datagram protocol [UDP] specially adapted for link layer protocols …

A hybrid approach of secret sharing with fragmentation and encryption in cloud environment for securing outsourced medical database: a revolutionary approach

DN Le, B Seth, S Dalal - Journal of Cyber Security and …, 2018 - journals.riverpublishers.com
Cloud Computing is observed as the greatest paradigm change in Information technology.
Data outsourcing is an inventive representation with the intention of trustworthy storage and …

[КНИГА][B] Security designs for the cloud, IoT, and social networking

DN Le, C Bhatt, M Madhukar - 2019 - books.google.com
Security concerns around the rapid growth and variety of devices that are controlled and
managed over the Internet is an immediate potential threat to all who own or use them. This …

System and method for improving content fetching by selecting tunnel devices

D Shribman, O Vilenski - US Patent 11,115,230, 2021 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
65525053&utm_source= google_patent&utm_medium= platform_link&utm_campaign …

CILP: Co-simulation-based imitation learner for dynamic resource provisioning in cloud computing environments

S Tuli, G Casale, NR Jennings - IEEE Transactions on Network …, 2023 - ieeexplore.ieee.org
Intelligent Virtual Machine (VM) provisioning is central to cost and resource efficient
computation in cloud computing environments. As bootstrap** VMs is time-consuming, a …