International Journal of Information Security and Privacy,
Journal Year:
2022,
Volume and Issue:
16(1), P. 1 - 20
Published: Aug. 5, 2022
Many
encryption
strategies
have
been
applied
to
ensure
data
confidentiality
and
improve
cloud
security.
The
most
recent
cryptosystems
are
based
on
homomorphic
(HE),
attribute-based
(ABE),
hybrid
encryption.
However,
of
them
suffer
from
numerous
drawbacks:
high
time
consumption,
encrypted
message
size,
some
vulnerabilities.
Hence,
a
secure
method
is
highly
required
get
satisfying
security
level
while
keeping
the
computational
complexity
reduced.
This
paper
outlines
novel
technique
that
combines
elliptic
curve
cryptography
(ECC)
Blockchain
technology.
first
encoded
using
Elliptic
Curve
Integrated
Encryption
Scheme,
then
signed
Digital
Signature
Algorithm,
finally
confirmed
by
blockchain
network
before
being
stored
in
cloud.
performance
evaluation
results
prove
proposed
system
resistant
man-in-the-middle
replay
attacks
performs
better
than
set
existing
solutions
terms
cost,
encryption/decryption
time,
algortithm
complexity.
Security and Communication Networks,
Journal Year:
2022,
Volume and Issue:
2022, P. 1 - 10
Published: Feb. 25, 2022
The
existing
teaching
quality
evaluation
methods
cannot
calculate
the
distance
between
data
points
of
dataset
and
center
large
density
grid,
which
leads
to
poor
classification
low
accuracy
evaluation.
Therefore,
a
method
Wushu
based
on
fuzzy
clustering
is
proposed.
In
order
improve
comprehensiveness
evaluation,
lost
resources
were
recovered.
Based
this,
grid
index
martial
arts
established,
relationship
model
achievement
constructed.
characteristics
resources,
introduced
each
point
with
high
density.
experimental
results
show
that
high,
can
be
accurately
efficiency,
reliability,
stability
are
ideal.
Bulletin of Electrical Engineering and Informatics,
Journal Year:
2022,
Volume and Issue:
11(2), P. 1110 - 1116
Published: April 1, 2022
The
amount
of
data
that
must
be
processed,
stored,
and
modified
rises
as
time
passes.
An
enormous
volume
from
a
wide
range
sources
stored
on
safe
platform.
Maintaining
such
large
single
computer
or
hard
drive
is
impracticable.
As
result,
the
cloud
ideal
platform
for
storing
any
quantity
data.
advantage
in
it
may
accessed
at
device.
However,
security
big
concern.
Because
this,
despite
benefits,
most
users
are
reluctant
to
move
their
papers
cloud.
should
encrypted
before
sending
off
service
provider
avoid
this
issue.
It's
great
way
increase
your
papers.
According
new
technique
presented
system,
searched
across
files
without
compromising
privacy
various
owners.
Implementing
pallier
homomorphic
encryption
method
makes
possible
perform
computations
decryption.
Deleted Journal,
Journal Year:
2024,
Volume and Issue:
20(4s), P. 111 - 124
Published: April 8, 2024
Effective
management
of
health
data
is
critical
in
this
age
digital
change.
In
order
to
solve
the
issues
with
safe
healthcare
systems,
paper
suggests
a
brand-new
Hybrid
Healthcare
Data
Management
System
(HDMS)
that
seamlessly
combines
blockchain
and
cloud
computing
technology.
The
solution
guarantees
storage
effective
administration
by
utilizing
scalability
flexibility
computing.
Ethereum
blockchain,
which
offers
immutability
through
smart
contracts
for
integrity
assurance,
used
improve
security.
Important
components
suggested
approach
include
Blockchain
Anchoring,
uses
distinct
hash
references
on
ensure
integrity,
Google
Cloud
Integration
scalable
immediate
access,
compliance
Health
Level
7
(HL7)
formatting
criteria
medical
storage.
Robust
privacy
safeguards
cutting-edge
methods
like
decentralized
identifiers
(DIDs)
homomorphic
encryption,
guarantee
secure
computations
encrypted
trustworthy
identification
allowed
access.
IPFS
file
system
security
providing
redundancy
resilience.
By
blockchain's
storage's
distributed
architecture,
HDMS
demonstrates
resilience
against
disturbances.
Results
proposed
method
implemented
Python
Software.
Homomorphic
has
been
continuously
beats
Optimized
Blowfish
Algorithm
(OBA)
terms
encryption
decryption
times.
improvement
between
3000ms
(10
kb)
1350ms
(40
kb).
enhancement
improved
efficiency
across
sizes,
ranging
from
4000ms
3350ms
decryption.
goal
create
future
patient
outcomes
are
enhanced
appropriate
handling,
storage,
analysis,
use
data.
Abstract.
Cloud
computing
is
becoming
increasingly
popular
in
the
IT
business
because
of
its
higher
performance,
widespread
access,
cheap
cost,
and
other
benefits.
It
also
a
pay-as-you-go
approach;
hence,
anyone
can
access
cloud
data
from
anywhere,
it
employed
education
platforms
for
online
classes
due
to
ease
use.
However,
many
educational
institutions
hesitate
use
platform
security
privacy
issues.
Hence
this
study,
performance
analysis
various
cryptographic
algorithms
such
as
Elliptic
Curve
Cryptography
(ECC),
Advanced
encryption
standard
(AES),
Two
Fish,
Blowfish,
Data
Encryption
Standard
(DES),
Triple
(TDES)
role-based
control
(RBAC)
was
analyzed
compared
with
each
view
ensuring
protection
storage
used
purpose
NPTEL
database.
time,
decryption
retrieval
time
different
sizes
were
evaluation
factors
figure
out
best
End-To-End
network
system.
Moreover,
an
ElGamal
SBO
Delta
Competitive
NN
has
been
proposed
which
Stag
beetle
optimization
performs
generation
optimized
key
low
execution
thereby
allowing
only
authorized
users
transmission
secured
using
that
minimizes
vulnerable
attacks
while
controlling
activity.
Results
showed
better
than
all
techniques
terms
communication
computational
overhead
hence
when
applied
scenario,
improve
effectiveness.
Wireless Communications and Mobile Computing,
Journal Year:
2022,
Volume and Issue:
2022, P. 1 - 10
Published: March 18, 2022
In
order
to
realize
the
security
of
prison
perimeter,
a
perimeter
intelligent
monitoring
system
based
on
cloud
intelligence
technology
is
designed.
Based
multisupply
chain
collaboration
framework,
network
interface
submodule
and
sniffer
structure
are
connected
demand
complete
hardware
execution
environment
system.
Analyze
specific
service
mode
smart
host,
set
necessary
protocol,
judge
processing
information
parameters,
select
remote
communication
port
number,
IP
address
password
program,
construction
software
system,
intelligently
monitor
track
abnormal
conditions
around
prison;
combined
with
relevant
structure,
design
realized.
The
experimental
results
show
that
DPI
index
designed
has
an
obvious
upward
trend,
close
original
image
avoid
impact
caused
by
change
scene.