Brajendra Panda Data-verified
Affiliation confirmed via AI analysis of OpenAlex, ORCID, and web sources.
Researcher
faculty
Research Areas
Links
Biography and Research Information
OverviewAI-generated summary
Brajendra Panda's research focuses on data security and integrity within distributed computing environments, particularly in the context of fog and cloud systems. His recent publications investigate secure data fetching from outsourced encrypted databases, blockchain-based encryption models for fog nodes, and data integrity preservation in smart healthcare systems utilizing fog computing. Panda also explores real-time fraud detection in health insurance using artificial intelligence and approaches to access control and damage assessment in large datasets within cloud and fog computing systems. His work addresses the challenges of protecting sensitive information and ensuring the reliability of data in increasingly complex networked infrastructures. Panda has published 151 papers, accumulating 1,249 citations, and holds an h-index of 18. He has collaborated with Thanh Duc Bui, Shruthi Ramakrishnan, and N. J. Buchanan, all from the University of Arkansas at Fayetteville.
Metrics
- h-index: 18
- Publications: 148
- Citations: 1,249
Selected Publications
-
Word-embedding approach for unknown attributes in access control model (2025)
-
A Secure Transaction Execution Model for Maintaining the Integrity of Fog-Based Databases (2025)
-
Word-embedding Approach for Unknown Attributes in Access Control Model (2025)
-
Value Embedding Approach for Access Control (2025)
-
Accelerating Cloud Database Recovery for Providing Real-Time Service After a Cyberattack (2025)
-
ClusteredLog: Optimizing Log Structures for Efficient Data Recovery and Integrity Management in Database Systems (2024)
-
Damage Assessment in Fog Computing Systems: A Blind Write Lineage Approach (2024)
-
A Multi-Model Rouge Nodes Detection System for Fog Computing (2023)
-
Assessing Damage and Recovery of Critical Data in Unsecure Cloud Systems (2023)
-
Optimized Damage Assessment in Large Datasets in Cloud (2022)
-
A Novel Blockchain-Based Encryption Model to Protect Fog Nodes from Behaviors of Malicious Nodes (2021)
-
Data Integrity Preservation Schemes in Smart Healthcare Systems That Use Fog Computing Distribution (2021)
-
An Efficient Secure System for Fetching Data From the Outsourced Encrypted Databases (2021)
Collaboration Network
Top Collaborators
- Value Embedding Approach for Access Control
- A Multi-Model Rouge Nodes Detection System for Fog Computing
- Word-embedding Approach for Unknown Attributes in Access Control Model
- Word-embedding approach for unknown attributes in access control model
- An Efficient Secure System for Fetching Data From the Outsourced Encrypted Databases
- Data Integrity Preservation Schemes in Smart Healthcare Systems That Use Fog Computing Distribution
- A Novel Blockchain-Based Encryption Model to Protect Fog Nodes from Behaviors of Malicious Nodes
- An Efficient Secure System for Fetching Data From the Outsourced Encrypted Databases
- Data Integrity Preservation Schemes in Smart Healthcare Systems That Use Fog Computing Distribution
- A Novel Blockchain-Based Encryption Model to Protect Fog Nodes from Behaviors of Malicious Nodes
- An Efficient Secure System for Fetching Data From the Outsourced Encrypted Databases
- Data Integrity Preservation Schemes in Smart Healthcare Systems That Use Fog Computing Distribution
- A Novel Blockchain-Based Encryption Model to Protect Fog Nodes from Behaviors of Malicious Nodes
- Assessing Damage and Recovery of Critical Data in Unsecure Cloud Systems
- Modeling Damage Paths and Repairing Objects in Critical Infrastructure Systems
- Damage Assessment in Fog Computing Systems: A Blind Write Lineage Approach
- ClusteredLog: Optimizing Log Structures for Efficient Data Recovery and Integrity Management in Database Systems
- Modeling Damage Paths and Repairing Objects in Critical Infrastructure Systems
- A Novel Blockchain-Based Encryption Model to Protect Fog Nodes from Behaviors of Malicious Nodes
- A Novel Blockchain-Based Encryption Model to Protect Fog Nodes from Behaviors of Malicious Nodes
- A Novel Blockchain-Based Encryption Model to Protect Fog Nodes from Behaviors of Malicious Nodes
- Optimized Damage Assessment in Large Datasets in Cloud
- Real-Time Fraud Detection in Health Insurance Using AI: Opportunities and Challenges
- Leveraging AI in Health Informatics for Early Diagnosis and Disease Monitoring
- Leveraging AI in Health Informatics for Early Diagnosis and Disease Monitoring
- Accelerating Cloud Database Recovery for Providing Real-Time Service After a Cyberattack
Similar Researchers
Based on overlapping research topics