February 2024
·
8 Reads
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
February 2024
·
8 Reads
February 2024
·
38 Reads
·
2 Citations
Journal of Cloud Computing
Cloud computing is a new paradigm in this new cyber era. Nowadays, most organizations are showing more reliability in this environment. The increasing reliability of the Cloud also makes it vulnerable. As vulnerability increases, there will be a greater need for privacy in terms of data, and utilizing secure services is highly recommended. So, data on the Cloud must have some privacy mechanisms to ensure personal and organizational privacy. So, for this, we must have an authentic way to increase the trust and reliability of the organization and individuals The authors have tried to create a way to rank things that uses the Analytical Hieratical Process (AHP) and the Technique for Order Preference by Similarity to the Ideal Solution (TOPSIS). Based on the result and comparison, produce some hidden advantages named cost, benefit, risk and opportunity-based outcomes of the result. In this paper, we are developing a cloud data privacy model; for this, we have done an intensive literature review by including Privacy factors such as Access Control, Authentication, Authorization, Trustworthiness, Confidentiality, Integrity, and Availability. Based on that review, we have chosen a few parameters that affect cloud data privacy in all the phases of the data life cycle. Most of the already available methods must be revised per the industry’s current trends. Here, we will use Analytical Hieratical Process and Technique for Order Preference by Similarity to the Ideal Solution method to prove that our claim is better than other cloud data privacy models. In this paper, the author has selected the weights of the individual cloud data privacy criteria and further calculated the rank of individual data privacy criteria using the AHP method and subsequently utilized the final weights as input of the TOPSIS method to rank the cloud data privacy criteria.
November 2023
·
66 Reads
·
7 Citations
Journal of Cloud Computing
Energy theft is a significant problem that needs to be addressed for effective energy management in smart cities. Smart meters are highly utilized in smart cities that help in monitoring the energy utilization level and provide information to the users. However, it is not able to detect energy theft or over-usage. Therefore, we have proposed a multi-objective diagnosing structure named an Energy Theft Prevention System (ETPS) to detect energy theft. The proposed system utilizes a combination of machine learning techniques Gated Recurrent Unit (GRU), Grey Wolf Optimization (GWO), Deep Recurrent Convolutional Neural Network (DDRCNN), and Long Short-Term Memory (LSTM). The statistical validation has been performed using the simple moving average (SMA) method. The results obtained from the simulation have been compared with the existing technique in terms of delivery ratio, throughput, delay, overhead, energy conversation, and network lifetime. The result shows that the proposed system is more effective than existing systems.
April 2023
·
13 Reads
·
2 Citations
December 2022
·
16 Reads
... Yet, with this promise comes a host of technical, social, and ethical considerations. We explore the multifaceted nature of smart cities, unpacking the technologies that underpin their operation and the challenges that must be overcome to realize their full potential [6]. ...
February 2024
Journal of Cloud Computing
... This includes the development of adaptive strategies capable of dynamically adjusting to real-time network conditions, promising even more efficient hotspot mitigation. In addition, this research will investigate the integration of HM-PGA with cutting-edge technologies such as the Internet of Things (IoT) and Artificial Intelligence (AI) [53], aiming to unlock new efficiencies and capabilities in Wireless Sensor Networks (WSNs) for applications in environmental monitoring, smart cities, and healthcare [54]. Insights from this study also have broader implications for WSN research, including the development of energy-efficient routing protocols, dynamic sensor deployment strategies, robust security mechanisms, and cross-layer network optimization. ...
November 2023
Journal of Cloud Computing
... Electronic health records (EHR) systems play a pivotal role in streamlining healthcare workflows, providing a centralized repository for patient information that can be accessed and updated by authorized healthcare providers across different care settings [34]. Interoperability standards ensure seamless communication and data exchange between disparate systems, facilitating coordinated care and reducing the risk of errors. ...
April 2023