Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (35)
  • Open Access


    User Centric Block-Level Attribute Based Encryption in Cloud Using Blockchains

    S. Godfrey Winster1, A. Siva Kumar2,*, R. Ramesh3

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 605-618, 2022, DOI:10.32604/csse.2022.022467

    Abstract Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient manner. The advantages of cloud computing is its remote access where data can accessed in real time using Remote Method Innovation (RMI). The problem of data security in cloud environment is a major concern since the data can be accessed by any time by any user. Due to the lack of providing the efficient security the cloud computing they fail to achieve higher performance in providing the efficient service. To improve the performance in data security, the block chains… More >

  • Open Access


    Analyzing the Implications of Healthcare Data Breaches through Computational Technique

    Ahmed H. Almulihi1, Fawaz Alassery2, Asif Irshad Khan3, Sarita Shukla4, Bineet Kumar Gupta4, Rajeev Kumar4,*

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1763-1779, 2022, DOI:10.32604/iasc.2022.023460

    Abstract The contributions of the Internet of Medical Things (IoMT), cloud services, information systems, and smart devices are useful for the healthcare industry. With the help of digital healthcare, our lives have been made much more secure and effortless and provide more convenient and accessible treatment. In current, the modern healthcare sector has become more significant and convenient for the purpose of both external and internal threats. Big data breaches affect clients, stakeholders, organisations, and businesses, and they are a source of concern and complication for security professionals. This research examines the many types and categories of big data breaches that… More >

  • Open Access


    Protecting Data Mobility in Cloud Networks Using Metadata Security

    R. Punithavathi1,*, M. Kowsigan2, R. Shanthakumari3, Miodrag Zivkovic4, Nebojsa Bacanin4, Marko Sarac4

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 105-120, 2022, DOI:10.32604/csse.2022.020486

    Abstract At present, health care applications, government services, and banking applications use big data with cloud storage to process and implement data. Data mobility in cloud environments uses protection protocols and algorithms to secure sensitive user data. Sometimes, data may have highly sensitive information, leading users to consider using big data and cloud processing regardless of whether they are secured are not. Threats to sensitive data in cloud systems produce high risks, and existing security methods do not provide enough security to sensitive user data in cloud and big data environments. At present, several security solutions support cloud systems. Some of… More >

  • Open Access


    Analyzing the Big Data Security Through a Unified Decision-Making Approach

    Abdulaziz Attaallah1, Hassan Alsuhabi2, Sarita Shukla3, Rajeev Kumar3,*, Bineet Kumar Gupta3, Raees Ahmad Khan4

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1071-1088, 2022, DOI:10.32604/iasc.2022.022569

    Abstract The use of cloud services, web-based software systems, the Internet of Things (IoT), Machine Learning (ML), Artificial Intelligence (AI), and other wireless sensor devices in the health sector has resulted in significant advancements and benefits. Early disease detection, increased accessibility, and high diagnostic reach have all been made possible by digital healthcare. Despite this remarkable achievement, healthcare data protection has become a serious issue for all parties involved. According to data breach statistics, the healthcare data industry is one of the major threats to cyber criminals. In reality, healthcare data breaches have increased at an alarming rate in recent years.… More >

  • Open Access


    A Secure Encrypted Classified Electronic Healthcare Data for Public Cloud Environment

    Kirupa Shankar Komathi Maathavan1,*, Santhi Venkatraman2

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 765-779, 2022, DOI:10.32604/iasc.2022.022276

    Abstract The major operation of the blood bank supply chain is to estimate the demand, perform inventory management and distribute adequate blood for the needs. The proliferation of big data in the blood bank supply chain and data management needs an intelligent, automated system to classify the essential data so that the requests can be handled easily with less human intervention. Big data in the blood bank domain refers to the collection, organization, and analysis of large volumes of data to obtain useful information. For this purpose, in this research work we have employed machine learning techniques to find a better… More >

  • Open Access


    Security and Privacy Aspects of Cloud Computing: A Smart Campus Case Study

    Sajid Habib Gill1, Mirza Abdur Razzaq1, Muneer Ahmad2, Fahad M. Almansour3, Ikram Ul Haq4, NZ Jhanjhi5,*, Malik Zaib Alam6, Mehedi Masud7

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 117-128, 2022, DOI:10.32604/iasc.2022.016597

    Abstract The trend of cloud computing is accelerating along with emerging technologies such as utility computing, grid computing, and distributed computing. Cloud computing is showing remarkable potential to provide flexible, cost-effective, and powerful resources across the internet, and is a driving force in today’s most prominent computing technologies. The cloud offers the means to remotely access and store data while virtual machines access data over a network resource. Furthermore, cloud computing plays a leading role in the fourth industrial revolution. Everyone uses the cloud daily life when accessing Dropbox, various Google services, and Microsoft Office 365. While there are many advantages… More >

  • Open Access


    Machine Learning Based Framework for Maintaining Privacy of Healthcare Data

    Adil Hussain Seh1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Alka Agrawal1, Rajeev Kumar4,*, Raees Ahmad Khan1

    Intelligent Automation & Soft Computing, Vol.29, No.3, pp. 697-712, 2021, DOI:10.32604/iasc.2021.018048

    Abstract The Adoption of Artificial Intelligence (AI), Machine Learning (ML), Internet of Things (IoT), cloud services, web-based software systems, and other wireless sensor devices in the healthcare infrastructure have led to phenomenal improvements and benefits in the healthcare sector. Digital healthcare has ensured early diagnosis of the diseases, greater accessibility, and mass outreach in terms of treatment. Despite this unprecedented success, the privacy and confidentiality of the healthcare data have become a major concern for all the stakeholders. Data breach reports reveal that the healthcare data industry is one of the key targets of cyber invaders. In fact the last few… More >

  • Open Access


    An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment

    K. Raju*, M. Chinnadurai

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1057-1072, 2021, DOI:10.32604/cmc.2021.016068

    Abstract Security is a critical issue in cloud computing (CC) because attackers can fabricate data by creating, copying, or deleting data with no user authorization. Most of the existing techniques make use of password-based authentication for encrypting data. Password-based schemes suffer from several issues and can be easily compromised. This paper presents a new concept of hybrid metaheuristic optimization as an identity-based secure and optimal authentication (HMO-ISOA) scheme for CC environments. The HMO-ISOA technique makes use of iris and fingerprint biometrics. Initially, the HMO-ISOA technique involves a directional local ternary quantized extrema pattern–based feature extraction process to extract features from the… More >

  • Open Access


    Extended Forgery Detection Framework for COVID-19 Medical Data Using Convolutional Neural Network

    Sajid Habib Gill1, Noor Ahmed Sheikh1, Samina Rajpar1, Zain ul Abidin2, N. Z. Jhanjhi3,*, Muneer Ahmad4, Mirza Abdur Razzaq1, Sultan S. Alshamrani5, Yasir Malik6, Fehmi Jaafar7

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3773-3787, 2021, DOI:10.32604/cmc.2021.016001

    Abstract Medical data tampering has become one of the main challenges in the field of secure-aware medical data processing. Forgery of normal patients’ medical data to present them as COVID-19 patients is an illegitimate action that has been carried out in different ways recently. Therefore, the integrity of these data can be questionable. Forgery detection is a method of detecting an anomaly in manipulated forged data. An appropriate number of features are needed to identify an anomaly as either forged or non-forged data in order to find distortion or tampering in the original data. Convolutional neural networks (CNNs) have contributed a… More >

  • Open Access


    A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks

    A. F. M. Suaib Akhter1,*, A. F. M. Shahen Shah2, Mohiuddin Ahmed3, Nour Moustafa4, Unal Çavuşoğlu1, Ahmet Zengin1

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 229-246, 2021, DOI:10.32604/cmc.2021.015447

    Abstract Vehicular Ad hoc Networks (VANETs) become a very crucial addition in the Intelligent Transportation System (ITS). It is challenging for a VANET system to provide security services and parallelly maintain high throughput by utilizing limited resources. To overcome these challenges, we propose a blockchain-based Secured Cluster-based MAC (SCB-MAC) protocol. The nearby vehicles heading towards the same direction will form a cluster and each of the clusters has its blockchain to store and distribute the safety messages. The message which contains emergency information and requires Strict Delay Requirement (SDR) for transmission are called safety messages (SM). Cluster Members (CMs) sign SMs… More >

Displaying 21-30 on page 3 of 35. Per Page