⏩ Volume 22, Issue No.5, 2024 (CNI)
Quantum-Enhanced Key Exchange Protocol for Securing Satellite-to-Ground Communications in Cloud-Based Aerospace Systems

This paper presents a quantum-enhanced key exchange protocol integrated with cloud aerospace infrastructures. The scheme provides secure satellite-ground data transfer, mitigating classical vulnerabilities and ensuring ultra-high integrity and confidentiality across mission-critical aerospace communication networks.

Benjamin Isaac Harlow, Jessica Penelope Fox, William Andrew Langley, Charlotte Abigail Morton, Edward Thomas Blake

Paper ID: 72422501
✅ Access Request

Real-Time Anomaly Detection in Multi-Cloud Infrastructures Using a Self-Adaptive Neural Monitoring Framework

A novel self-adaptive neural network is introduced for anomaly detection in multi-cloud infrastructures. It continuously learns normal system behavior and autonomously adapts to dynamic environments, providing high-accuracy alerts with minimal false positives for enhanced system reliability and cybersecurity assurance.

Samantha Ivy Greenwood, Patrick Wesley Knox, Rachel Elise Vaughan, Jacob Harrison Rees, Victoria Maynard Bentley

Paper ID: 72422502
✅ Access Request

Securing Cloud-Connected Autonomous Vehicles with Multi-Layered Trust Mechanisms and Blockchain-Backed Identity Management

This research proposes a hybrid trust architecture combining blockchain-based identity validation and layered security protocols to defend autonomous vehicle cloud interfaces from spoofing and injection attacks while maintaining seamless communication and system performance.

Oliver James Stratton, Emily Francesca Holt, Henry Joseph Templeton, Amelia Charlotte Wright, Daniel Zachary Wilkins

Paper ID: 72422503
✅ Access Request

Privacy-Preserving Federated Identity Authentication in Cross-Region Cloud Services Using Homomorphic Encryption

The paper presents a federated identity authentication framework utilizing homomorphic encryption to enable privacy-preserving access to cross-region cloud services. The system supports seamless user experience while preventing identity leakage across federated cloud platforms.

Jonathan Rupert Sloane, Isabella Juliet Reed, Thomas Harvey Chandler, Grace Matilda Hopkins, Leo Patrick Fleming

Paper ID: 72422504
✅ Access Request

AI-Powered Threat Intelligence Pipeline for Real-Time Cyber Risk Prediction in Large-Scale Cloud Networks

We design a scalable threat intelligence engine using AI to perform real-time risk analysis in large cloud infrastructures. It fuses threat feeds and behavioral analytics, enabling proactive mitigation and rapid response to emerging cybersecurity threats.

George Nathaniel Carmichael, Madeleine Elise Newton, Zachary Owen Caldwell, Harriet Eleanor Forbes, Nicholas Rowan Sinclair

Paper ID: 72422505
✅ Access Request

Zero-Trust Security Architecture Implementation for Distributed Cloud Environments Using Policy-Aware Access Models

This paper introduces a zero-trust security framework with dynamic policy-aware access control for distributed cloud environments. It ensures minimal trust assumptions and continuous verification, significantly reducing lateral movement risks and enhancing multi-tenant cloud system security.

Julian Frederick Whitman, Clara Beatrice Ellison, Dominic Lucas Pryce, Eleanor Faith Hargrave, Sebastian Alfred Knox

Paper ID: 72422506
✅ Access Request

Lightweight Cryptographic Mechanisms for Securing Edge-Cloud IoT Communication Channels in Industrial Control Systems

We develop a suite of lightweight cryptographic algorithms optimized for securing edge-cloud IoT communications in industrial environments. The framework maintains confidentiality and integrity with minimal overhead, ensuring robust protection for smart manufacturing and critical infrastructure systems.

Louis Bernard Easton, Phoebe Caroline Radcliffe, Maxwell Adrian Grant, Felicity Annette Holbrook, Alexander Edward Rowley

Paper ID: 72422507
✅ Access Request

Back