Outsourcing data to a third-party administrative control, as is done in cloud computing, gives rise to security concerns. The data compromise may occur due to attacks by other users and nodes within the cloud. Therefore, high security measures are required to protect data within the cloud. However, the employed security strategy must also take into […]
Publication type: Journal Paper
Publication type: Journal Paper
Wireless ad hoc network system is a foundation less multi-hop system of versatile remote hubs with heterogamous assets. The attributes of WANETs are adjustment, self-shaping and shared systems administration. The transmission of data is happen legitimately if the conveying hubs present in the radio scope of each other generally the correspondence is hand-off on the […]
Publication type: Journal Paper
Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage. In this paper, we investigate the security of a well-known cryptographic primitive, namely, public key encryption with keyword search (PEKS) which is very useful in many applications of cloud storage. Unfortunately, it has been shown that the traditional PEKS framework suffers […]
Publication type: Journal Paper
After the 2020 pandemic, everyone realized that the collaborations which were being done offline had to go online. This created a stir among the community as there was no legal bond between the two entities working together. Be it a large company working for another one or an individual working as a contractor. Smart contracts […]