Khair Ul Nisa's research while affiliated with College of Computer and Information Sciences and other places

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (5)


Beyond Boundaries:Strengthening the Fabric of IoT Security through Blockchain Innovations
  • Conference Paper

February 2024

·

8 Reads

Khair Ul Nisa

·

Hanan Saad Alqahtani

·

Ummatul Fatima

·

[...]

·

Gousiya Hussain
Share

Proposed model of cloud data privacy
Representation CP_AHP and CP_TOPSIS method
General correlation among goals, alternatives, and criteria
Ranking chart of AHP-TOPSIS
Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach
  • Article
  • Full-text available

February 2024

·

38 Reads

·

2 Citations

Journal of Cloud Computing

Cloud computing is a new paradigm in this new cyber era. Nowadays, most organizations are showing more reliability in this environment. The increasing reliability of the Cloud also makes it vulnerable. As vulnerability increases, there will be a greater need for privacy in terms of data, and utilizing secure services is highly recommended. So, data on the Cloud must have some privacy mechanisms to ensure personal and organizational privacy. So, for this, we must have an authentic way to increase the trust and reliability of the organization and individuals The authors have tried to create a way to rank things that uses the Analytical Hieratical Process (AHP) and the Technique for Order Preference by Similarity to the Ideal Solution (TOPSIS). Based on the result and comparison, produce some hidden advantages named cost, benefit, risk and opportunity-based outcomes of the result. In this paper, we are developing a cloud data privacy model; for this, we have done an intensive literature review by including Privacy factors such as Access Control, Authentication, Authorization, Trustworthiness, Confidentiality, Integrity, and Availability. Based on that review, we have chosen a few parameters that affect cloud data privacy in all the phases of the data life cycle. Most of the already available methods must be revised per the industry’s current trends. Here, we will use Analytical Hieratical Process and Technique for Order Preference by Similarity to the Ideal Solution method to prove that our claim is better than other cloud data privacy models. In this paper, the author has selected the weights of the individual cloud data privacy criteria and further calculated the rank of individual data privacy criteria using the AHP method and subsequently utilized the final weights as input of the TOPSIS method to rank the cloud data privacy criteria.

Download

A broad overview of smart cities components
Proposed Energy Theft Prevention System
Evolution of position in GWO
Performance analysis of the proposed system
An internet of things enabled machine learning model for Energy Theft Prevention System (ETPS) in Smart Cities

November 2023

·

66 Reads

·

7 Citations

Journal of Cloud Computing

Energy theft is a significant problem that needs to be addressed for effective energy management in smart cities. Smart meters are highly utilized in smart cities that help in monitoring the energy utilization level and provide information to the users. However, it is not able to detect energy theft or over-usage. Therefore, we have proposed a multi-objective diagnosing structure named an Energy Theft Prevention System (ETPS) to detect energy theft. The proposed system utilizes a combination of machine learning techniques Gated Recurrent Unit (GRU), Grey Wolf Optimization (GWO), Deep Recurrent Convolutional Neural Network (DDRCNN), and Long Short-Term Memory (LSTM). The statistical validation has been performed using the simple moving average (SMA) method. The results obtained from the simulation have been compared with the existing technique in terms of delivery ratio, throughput, delay, overhead, energy conversation, and network lifetime. The result shows that the proposed system is more effective than existing systems.



Citations (3)


... Yet, with this promise comes a host of technical, social, and ethical considerations. We explore the multifaceted nature of smart cities, unpacking the technologies that underpin their operation and the challenges that must be overcome to realize their full potential [6]. ...

Reference:

Exploring Cutting-Edge Technologies in Computer Science: A Comprehensive Review
Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach

Journal of Cloud Computing

... This includes the development of adaptive strategies capable of dynamically adjusting to real-time network conditions, promising even more efficient hotspot mitigation. In addition, this research will investigate the integration of HM-PGA with cutting-edge technologies such as the Internet of Things (IoT) and Artificial Intelligence (AI) [53], aiming to unlock new efficiencies and capabilities in Wireless Sensor Networks (WSNs) for applications in environmental monitoring, smart cities, and healthcare [54]. Insights from this study also have broader implications for WSN research, including the development of energy-efficient routing protocols, dynamic sensor deployment strategies, robust security mechanisms, and cross-layer network optimization. ...

An internet of things enabled machine learning model for Energy Theft Prevention System (ETPS) in Smart Cities

Journal of Cloud Computing

... Electronic health records (EHR) systems play a pivotal role in streamlining healthcare workflows, providing a centralized repository for patient information that can be accessed and updated by authorized healthcare providers across different care settings [34]. Interoperability standards ensure seamless communication and data exchange between disparate systems, facilitating coordinated care and reducing the risk of errors. ...

Blockchain-based Secure Health Records in the Healthcare Industry
  • Citing Conference Paper
  • April 2023