Open Access iconOpen Access

ARTICLE

crossmark

Fortifying Healthcare Data Security in the Cloud: A Comprehensive Examination of the EPM-KEA Encryption Protocol

Umi Salma Basha1, Shashi Kant Gupta2, Wedad Alawad3, SeongKi Kim4,*, Salil Bharany5,*

1 Computer Science and Information Technology, Jazan University, Jazan, Saudi Arabia
2 CSE, Eudoxia Research University, New Castle, USA
3 Department of Information Technology, College of Computer, Qassim University, Buraydah, Saudi Arabia
4 National Center of Excellence in Software, Sangmyung University, Seoul, Korea
5 Department of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab, India

* Corresponding Authors: SeongKi Kim. Email: email; Salil Bharany. Email: email

TSP_CMC_46265.pdf

  • 670

    View

  • 236

    Download

  • 0

    Like

Share Link