Open Access
Issue |
E3S Web Conf.
Volume 556, 2024
International Conference on Recent Advances in Waste Minimization & Utilization-2024 (RAWMU-2024)
|
|
---|---|---|
Article Number | 01012 | |
Number of page(s) | 7 | |
DOI | https://doi.org/10.1051/e3sconf/202455601012 | |
Published online | 09 August 2024 |
- Singh, Shilpi, and Vinod Kumar. "Secured user's authentication and private data storage-access scheme in cloud computing using Elliptic curve cryptography." 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 2015.M. P. Brown and K. Austin, Appl. Phys. Letters 85, 2503–2504 (2004). [Google Scholar]
- Madavi, KP Bindu, and P. Vijaya Karthick. "Enhanced cloud security using cryptography and steganography techniques." 2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON). Vol. 1. IEEE, 2021. [Google Scholar]
- Ibrahim, Dheyab Salman. "Enhancing Cloud Computing Security using Cryptography & Steganography." Iraqi Journal of Information Technology 9 (2019). [Google Scholar]
- Pant, Vinay Kumar, Jyoti Prakash, and Amit Asthana. "Three step data security model for cloud computing based on RSA and steganography." 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). IEEE, 2015. [Google Scholar]
- Jaber, Aws Naser, and Mohamad Fadli Bin Zolkipli. "Use of cryptography in cloud computing." 2013 IEEE International conference on control systems, computing and Engineering. IEEE, 2013. [Google Scholar]
- Islam, SM Jahidul, Zulfiker Haider Chaudhury, and Saiful Islam. "A simple and secured cryptography system of cloud computing." 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE). IEEE, 2019. [Google Scholar]
- Abbas, Mustafa S., Suadad S. Mahdi, and Shahad A. Hussien. "Security improvement of cloud data using hybrid cryptography and steganography." 2020 international conference on computer science and software engineering (CSASE). IEEE, 2020. [Google Scholar]
- Adee, Rose, and Haralambos Mouratidis. "A dynamic four-step data security model for data in cloud computing based on cryptography and steganography." Sensors 22.3 (2022): 1109. [CrossRef] [PubMed] [Google Scholar]
- Dhamija, Ankit, and Vijay Dhaka. "A novel cryptographic and steganographic approach for secure cloud data migration." 2015 international conference on green computing and internet of things (ICGCIoT). IEEE, 2015. [Google Scholar]
- Chatterjee, Paramita, et al. "Enhancing data security of cloud based lms." Wireless Personal Communications 130.2 (2023): 1123–1139. [CrossRef] [PubMed] [Google Scholar]
- AlKhamese, Aya Y., Wafaa R. Shabana, and Ibrahim M. Hanafy. "Data security in cloud computing using steganography: a review." 2019 International Conference on Innovative Trends in Computer Engineering (ITCE). IEEE, 2019. [Google Scholar]
- Rampal Singh, Sawan Kumar, and Shani Kumar Agrahari. "Ensuring data storage security in cloud computing." IOSR Journal of Engineering 2.12 (2012): 17–21. [CrossRef] [Google Scholar]
- Ahmed, Omar M., and Wafaa M. Abduallah. "A review on recent steganography techniques in cloud computing." Academic Journal of Nawroz University 6.3 (2017): 106–111. [CrossRef] [Google Scholar]
- Sarkar, Mrinal Kanti, and Trijit Chatterjee. "Enhancing data storage security in cloud computing through steganography." International Journal on Network Security 5.1 (2014): 13. [Google Scholar]
- Shankar, K., and S.K. Lakshmanaprabu. "Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm." International Journal of Engineering & Technology 7.9 (2018): 22–27. [Google Scholar]
- Sajjad, Muhammad, et al. "Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices." Multimedia Tools and Applications 76 (2017): 3519–3536. [CrossRef] [Google Scholar]
- Kamal, Maryam, et al. "Privacy-aware genetic algorithm-based data security framework for distributed cloud storage." Microprocessors and Microsystems 94 (2022): 104673. [CrossRef] [Google Scholar]
- Hu, Donghui, et al. "A novel image steganography method via deep convolutional generative adversarial networks." IEEE access 6 (2018): 38303–38314. [CrossRef] [Google Scholar]
- Ebrahim, Moshira A., Islam AM El-Maddah, and Hoda K. Mohamed. "Hybrid model for cloud data security using steganography." 2017 12th International Conference on Computer Engineering and Systems (ICCES). IEEE, 2017. [Google Scholar]
- Abel, Kolawole Damilare, et al. "Data security using cryptography and steganography technique on the cloud." Computational Intelligence in Machine Learning: Select Proceedings of ICCIML 2021. Singapore: Springer Nature Singapore, 2022. 475–481. [Google Scholar]
- Yesilyurt, Murat, and Yildiray Yalman. "New approach for ensuring cloud computing security: using data hiding methods." Sādhanā 41.11 (2016): 1289–1298. [Google Scholar]
- Wang, Zhangdong, et al. "A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing." Multimedia Systems 27.3 (2021): 403–415. [CrossRef] [Google Scholar]
- Adee, Rose, and Haralambos Mouratidis. "A dynamic four-step data security model for data in cloud computing based on cryptography and steganography." Sensors 22.3 (2022): 1109. [CrossRef] [PubMed] [Google Scholar]
- Dudiki, Narahari, et al. "A Hybrid Cryptography Algorithm to Improve Cloud Computing Security." 2022 5th International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2022. [Google Scholar]
- Abel, Kolawole Damilare, et al. "Data security using cryptography and steganography technique on the cloud." Computational Intelligence in Machine Learning: Select Proceedings of ICCIML 2021. Singapore: Springer Nature Singapore, 2022. 475–481. [Google Scholar]
- Alam, Khorshed, et al. "An Improved Approach of Image Steganography Based on Least Significant Bit Technique for Secure Communication in Cloud." International Conference on Advanced Network Technologies and Intelligent Computing. Cham: Springer Nature Switzerland, 2022. [Google Scholar]
- Bharathi, Putta, et al. "Secure file storage using hybrid cryptography." 2021 6th International Conference on Communication and Electronics Systems (ICCES). IEEE, 2021. [Google Scholar]
- Albalawi, Afrah, and Nermin Hamza. "A survey on cloud data security using image steganography." International Journal of Advanced Computer Science and Applications 11.1 (2020). [CrossRef] [Google Scholar]
- Gupta, Anil, Meghna Dubey, and Durgesh Kumar Mishra. "Design & Implementation of Enhanced Security Architecture to Improve Performance of Cloud Computing." Journel of university of shangai for science and technology 23 (2021). [Google Scholar]
- Pandey, Upasana, Meet Rajput, and Rakshit Singh. "Role of Machine Learning in Resource Usages and Security Challenges for Cloud Computing: Survey." 2023 International Conference on Artificial Intelligence and Smart Communication (AISC). IEEE, 2023. [Google Scholar]
- Murad, Sherief H., Amr M. Gody, and Tamer M. Barakat. "Enhanced security of symmetric encryption using combination of steganography with visual cryptography." arXiv preprint arXiv:1902.11167 (2019). [Google Scholar]
- Hosam, Osama, and Muhammad Hammad Ahmad. "Hybrid design for cloud data security using combination of AES, ECC and LSB steganography." International Journal of Computational Science and Engineering 19.2 (2019): 153–161. [CrossRef] [Google Scholar]
- Karrupusamy, P., Joy Chen, and Yong Shi, eds. Sustainable Communication Networks and Application: ICSCN 2019. Vol. 39. Springer Nature, 2019. [Google Scholar]
- Jiang, Shunzhi, et al. "SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application." Journal of Network and Computer Applications 165 (2020): 102689. [CrossRef] [Google Scholar]
- Jaber, Aws Naser, and Mohamad Fadli Bin Zolkipli. "Use of cryptography in cloud computing." 2013 IEEE International conference on control system, computing and Engineering. IEEE, 2013. [Google Scholar]
- Chatterjee, Paramita, et al. "Enhancing data security of cloud based lms." Wireless Personal Communications 130.2 (2023): 1123–1139. [CrossRef] [PubMed] [Google Scholar]
- Gupta, Anil, Meghna Dubey, and Durgesh Kumar Mishra. "Design & Implementation of Enhanced Security Architecture to Improve Performance of Cloud Computing." Journel of university of shangai for science and technology 23 (2021). [Google Scholar]
- Murad, Sherief H., Amr M. Gody, and Tamer M. Barakat. "Enhanced security of symmetric encryption using combination of steganography with visual cryptography." arXiv preprint arXiv:1902.11167 (2019). [Google Scholar]
- T. Baranwal, Nitika, and P. K. Pateriya, "Development of IoT based smart security and monitoring devices for agriculture," 2016: Institute of Electrical and Electronics Engineers Inc., pp. 597–602, DOI: 10.1109/CONFLUENCE.2016.7508189. [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85017305538&doi=10.1109%2fCONFLUENCE.2016.7508189&partnerID=40&md5=a3ab716b97a415a6e272ac65934b3788 [Google Scholar]
- R. S. Batth, A. Nayyar, and A. Nagpal, "Internet of Robotic Things: Driving Intelligent Robotics of Future -Concept, Architecture, Applications and Technologies," 2018: Institute of Electrical and Electronics Engineers Inc., pp. 151–160, DOI: 10.1109/ICCS.2018.00033. [Online]. Available: [Google Scholar]
- S. A. Dar, R. Sharma, V. Srivastava, and U. K. Sakalle, "Investigation on the electronic structure, optical, elastic, mechanical, thermodynamic and thermoelectric properties of wide band gap semiconductor double perovskite Ba(2)InTaO(6)," RSC Adv, Article vol. 9, no. 17, pp. 9522–9532, Mar 22 2019, DOI: 10.1039/c9ra00313d. [CrossRef] [PubMed] [Google Scholar]
- S. I. Manzoor, J. Singla, and Nikita, "Fake news detection using machine learning approaches: A systematic review," 2019: Institute of Electrical and Electronics Engineers Inc., pp. 230–234, DOI: 10.1109/ICOEI.2019.8862770. [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85074097965&doi=10.1109%2fICOEI.2019.8862770&partnerID=40&md5=ff6d3d201ac780d0a58f35f13d8d7948 [Google Scholar]
- A. Sharma, Sarishma, R. Tomar, N. Chilamkurti, and B. G. Kim, "Blockchain based smart contracts for internet of medical things in e-healthcare," Electronics (Switzerland), Article vol. 9, no. 10, pp. 1–14, 2020, Art no. 1609, DOI: 10.3390/electronics9101609 [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.