Securing the Future of Library Cloud Infrastructure with AQFA: Adaptive Quantum-Resistant Authentication DOI Open Access
Ajay N. Upadhyaya,

G. R. Reddy,

Sathyavani Addanki

и другие.

International Journal of Computational and Experimental Science and Engineering, Год журнала: 2025, Номер 11(2)

Опубликована: Март 25, 2025

The deployment of cloud infrastructure in libraries enhances scalability and availability resources, but different hazards have evolved, so has the need for sound security measures shielding critical information from some risks such as quantum computing’s risks. This paper proposes Quantum-Resistant Federated Authentication (AQFA) framework which uses federated learning with quantum-resistant cryptographic technologies improvement authentication library systems. AQFA employs a multilayer model ensures two things; user credential protection against attacks, privacy, accessibility. It also trust models to adapt its incident response real-time behavior; thereby making it easier manage unauthorized access. In addition, adapts homomorphic encryption help encrypt data processing ability that enables perform operations on encrypted data. thinking solution not only improves general infrastructures reasonable scale adjustment more digital environment. findings further affirm mitigating historical assets preventing leakage configuration

Язык: Английский

Blockchain-Enabled Secure Data Aggregation Routing (BSDAR) Protocol for IoT-Integrated Next-Generation Sensor Networks for Enhanced Security DOI Open Access

N Vidhya,

Ch Meenakshi

International Journal of Computational and Experimental Science and Engineering, Год журнала: 2025, Номер 11(1)

Опубликована: Янв. 5, 2025

WSNs, due to their special characteristics as compared conventional networks, have become the focus of extensive research. A large-scale IoT forms backbone billions resource-constrained next-generation sensors interconnected with each other. Their deployments remain one most serious challenges existing security mechanisms dynamic devices, which could not provide efficient protection against malicious adversaries. Besides, routing protocols are vulnerable various threats from unreliability and open-access nature internet. This research article presents a novel blockchain-enabled secure data aggregation model protocol for in IoT-integrated networks using sensor nodes. The BSDAR is capable improving energy performance while ensuring strong node-level shield attacks. It first organizes networking nodal points into autonomous clusters different radii effectively avoid holes around BS. Then, uses A-star based heuristics strategy construct well-organized non-looping paths. has integrated blockchain technology goal communication process. In that, end-to-end preserved by decentralized tamper-proof approach simulation results prove that significantly outperforms solutions consumption, throughput, network lifetime time complexity, thus presenting promising solution scalable deployments.

Язык: Английский

Процитировано

7

Techniques for load balancing throughout the cloud: a comprehensive literature analysis DOI Open Access

N. Francis,

N. V. Balaji

International Journal of Computational and Experimental Science and Engineering, Год журнала: 2025, Номер 11(1)

Опубликована: Янв. 12, 2025

Recently, "Cloud-Computing (CC)" has become increasingly common because it's a new paradigm for handling massive challenges in versatile and efficient way. CC is form of decentralized computation that uses an online network to facilitate the sharing various computational computing resources among large number consumers, most commonly referred as "Cloud-Users (CUs)”. The burdens on "Cloud-Server (CS)" could be either light or too heavy, depending how quickly volume CUs their demands are growing. Higher response times high resource usage two many issues resulting from these conditions. To address enhance CS efficiency, "Load-Balancing (LB)" approaches very effective. goal LB approach identify over-loading under-loading CSs distribute workload accordingly. Publications have employed numerous techniques broad effectiveness solutions, boost confidence end CUs, ensure effective governance suitable CS. A successful technique distributes tasks within network, thereby increasing performance maximizing utilization. Experts shown abundance engagement this issue offered several remedies over past decade. primary extensive review article examine different variables provide critical analysis current techniques. Additionally, outlines requirements explores associated with context CC. Conventional insufficient they ignore operational efficiency “Fault-Tolerance (FT)” measures. present article, bridge gaps existing research, assist academics gaining more knowledge about

Язык: Английский

Процитировано

0

Enhancing Cyber-Physical System Security through AI-Driven Intrusion Detection and Blockchain Integration DOI Open Access

N. Purandhar,

M. Rajendrian,

Ahmed Mudassar Ali

и другие.

International Journal of Computational and Experimental Science and Engineering, Год журнала: 2025, Номер 11(1)

Опубликована: Март 2, 2025

Cyber-Physical Systems (CPS) play a critical role in modern industries, smart grids, healthcare, and autonomous transportation. However, their increasing connectivity makes them vulnerable to cyber threats. This research proposes an AI-driven Intrusion Detection System (AI-IDS) integrated with Blockchain Technology enhance CPS security. The AI-IDS employs deep learning models for anomaly detection, leveraging graph-based machine federated improve real-time threat mitigation. Additionally, blockchain ensures data integrity, access control, decentralized security through contracts consensus mechanisms. framework is validated using real-world datasets, demonstrating improved detection accuracy, reduced false alarms, resilience against adversarial attacks. hybrid approach enhances scalability, trustworthiness, defense cyber-physical environments

Язык: Английский

Процитировано

0

Securing the Future of Library Cloud Infrastructure with AQFA: Adaptive Quantum-Resistant Authentication DOI Open Access
Ajay N. Upadhyaya,

G. R. Reddy,

Sathyavani Addanki

и другие.

International Journal of Computational and Experimental Science and Engineering, Год журнала: 2025, Номер 11(2)

Опубликована: Март 25, 2025

The deployment of cloud infrastructure in libraries enhances scalability and availability resources, but different hazards have evolved, so has the need for sound security measures shielding critical information from some risks such as quantum computing’s risks. This paper proposes Quantum-Resistant Federated Authentication (AQFA) framework which uses federated learning with quantum-resistant cryptographic technologies improvement authentication library systems. AQFA employs a multilayer model ensures two things; user credential protection against attacks, privacy, accessibility. It also trust models to adapt its incident response real-time behavior; thereby making it easier manage unauthorized access. In addition, adapts homomorphic encryption help encrypt data processing ability that enables perform operations on encrypted data. thinking solution not only improves general infrastructures reasonable scale adjustment more digital environment. findings further affirm mitigating historical assets preventing leakage configuration

Язык: Английский

Процитировано

0