Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments DOI

Faiza Benmenzer,

Rachid Beghdad

International Journal of Information Security and Privacy, Journal Year: 2022, Volume and Issue: 16(1), P. 1 - 20

Published: Aug. 5, 2022

Many encryption strategies have been applied to ensure data confidentiality and improve cloud security. The most recent cryptosystems are based on homomorphic (HE), attribute-based (ABE), hybrid encryption. However, of them suffer from numerous drawbacks: high time consumption, encrypted message size, some vulnerabilities. Hence, a secure method is highly required get satisfying security level while keeping the computational complexity reduced. This paper outlines novel technique that combines elliptic curve cryptography (ECC) Blockchain technology. first encoded using Elliptic Curve Integrated Encryption Scheme, then signed Digital Signature Algorithm, finally confirmed by blockchain network before being stored in cloud. performance evaluation results prove proposed system resistant man-in-the-middle replay attacks performs better than set existing solutions terms cost, encryption/decryption time, algortithm complexity.

Language: Английский

A security model to protect the isolation of medical data in the cloud using hybrid cryptography DOI

Swetha Gadde,

J. Amutharaj,

S. Usha

et al.

Journal of Information Security and Applications, Journal Year: 2023, Volume and Issue: 73, P. 103412 - 103412

Published: Jan. 10, 2023

Language: Английский

Citations

23

OSI network layers based secured data sharins in cloud computing using STXORSK-QC and dhdecct-MAC DOI Creative Commons

Chandra Shekhar Tiwari,

Vijay Kumar Jha

Deleted Journal, Journal Year: 2025, Volume and Issue: 28(1)

Published: March 31, 2025

Language: Английский

Citations

0

Evaluation Method of Wushu Teaching Quality Based on Fuzzy Clustering DOI Creative Commons

Zhechun Hu,

Yunxing Wang

Security and Communication Networks, Journal Year: 2022, Volume and Issue: 2022, P. 1 - 10

Published: Feb. 25, 2022

The existing teaching quality evaluation methods cannot calculate the distance between data points of dataset and center large density grid, which leads to poor classification low accuracy evaluation. Therefore, a method Wushu based on fuzzy clustering is proposed. In order improve comprehensiveness evaluation, lost resources were recovered. Based this, grid index martial arts established, relationship model achievement constructed. characteristics resources, introduced each point with high density. experimental results show that high, can be accurately efficiency, reliability, stability are ideal.

Language: Английский

Citations

8

Storage and encryption file authentication for cloud-based data retrieval DOI Open Access
Mustafa Qahtan Alsudani, Hassan Falah Fakhruldeen, Heba Abdul-Jaleel Al-Asady

et al.

Bulletin of Electrical Engineering and Informatics, Journal Year: 2022, Volume and Issue: 11(2), P. 1110 - 1116

Published: April 1, 2022

The amount of data that must be processed, stored, and modified rises as time passes. An enormous volume from a wide range sources stored on safe platform. Maintaining such large single computer or hard drive is impracticable. As result, the cloud ideal platform for storing any quantity data. advantage in it may accessed at device. However, security big concern. Because this, despite benefits, most users are reluctant to move their papers cloud. should encrypted before sending off service provider avoid this issue. It's great way increase your papers. According new technique presented system, searched across files without compromising privacy various owners. Implementing pallier homomorphic encryption method makes possible perform computations decryption.

Language: Английский

Citations

7

Privacy-preserving cloud-based secure digital locker with differential privacy-based deep learning technique DOI

P. Shanthi,

S. Vidivelli,

P. Padmakumari

et al.

Multimedia Tools and Applications, Journal Year: 2024, Volume and Issue: 83(34), P. 81299 - 81324

Published: March 5, 2024

Language: Английский

Citations

1

Integration of Ethereum Blockchain with Cloud Computing for Secure Healthcare Data Management System DOI Creative Commons

S. Prasanna Ginavanee A.

Deleted Journal, Journal Year: 2024, Volume and Issue: 20(4s), P. 111 - 124

Published: April 8, 2024

Effective management of health data is critical in this age digital change. In order to solve the issues with safe healthcare systems, paper suggests a brand-new Hybrid Healthcare Data Management System (HDMS) that seamlessly combines blockchain and cloud computing technology. The solution guarantees storage effective administration by utilizing scalability flexibility computing. Ethereum blockchain, which offers immutability through smart contracts for integrity assurance, used improve security. Important components suggested approach include Blockchain Anchoring, uses distinct hash references on ensure integrity, Google Cloud Integration scalable immediate access, compliance Health Level 7 (HL7) formatting criteria medical storage. Robust privacy safeguards cutting-edge methods like decentralized identifiers (DIDs) homomorphic encryption, guarantee secure computations encrypted trustworthy identification allowed access. IPFS file system security providing redundancy resilience. By blockchain's storage's distributed architecture, HDMS demonstrates resilience against disturbances. Results proposed method implemented Python Software. Homomorphic has been continuously beats Optimized Blowfish Algorithm (OBA) terms encryption decryption times. improvement between 3000ms (10 kb) 1350ms (40 kb). enhancement improved efficiency across sizes, ranging from 4000ms 3350ms decryption. goal create future patient outcomes are enhanced appropriate handling, storage, analysis, use data.

Language: Английский

Citations

1

An Analytical approach for optimal secured data storage on cloud server for online education platform DOI Creative Commons

R. Soundhara Raja Pandian,

Christopher Columbus

Published: Aug. 22, 2022

Abstract. Cloud computing is becoming increasingly popular in the IT business because of its higher performance, widespread access, cheap cost, and other benefits. It also a pay-as-you-go approach; hence, anyone can access cloud data from anywhere, it employed education platforms for online classes due to ease use. However, many educational institutions hesitate use platform security privacy issues. Hence this study, performance analysis various cryptographic algorithms such as Elliptic Curve Cryptography (ECC), Advanced encryption standard (AES), Two Fish, Blowfish, Data Encryption Standard (DES), Triple (TDES) role-based control (RBAC) was analyzed compared with each view ensuring protection storage used purpose NPTEL database. time, decryption retrieval time different sizes were evaluation factors figure out best End-To-End network system. Moreover, an ElGamal SBO Delta Competitive NN has been proposed which Stag beetle optimization performs generation optimized key low execution thereby allowing only authorized users transmission secured using that minimizes vulnerable attacks while controlling activity. Results showed better than all techniques terms communication computational overhead hence when applied scenario, improve effectiveness.

Language: Английский

Citations

6

Intelligent Monitoring System for Prison Perimeter Based on Cloud Intelligence Technology DOI Open Access
Tiande Pan

Wireless Communications and Mobile Computing, Journal Year: 2022, Volume and Issue: 2022, P. 1 - 10

Published: March 18, 2022

In order to realize the security of prison perimeter, a perimeter intelligent monitoring system based on cloud intelligence technology is designed. Based multisupply chain collaboration framework, network interface submodule and sniffer structure are connected demand complete hardware execution environment system. Analyze specific service mode smart host, set necessary protocol, judge processing information parameters, select remote communication port number, IP address password program, construction software system, intelligently monitor track abnormal conditions around prison; combined with relevant structure, design realized. The experimental results show that DPI index designed has an obvious upward trend, close original image avoid impact caused by change scene.

Language: Английский

Citations

5

Dingo optimization based network bandwidth selection to reduce processing time during data upload and access from cloud by user DOI

J. Sulthan Alikhan,

R. Alageswaran,

S. Miruna Joe Amali

et al.

Telecommunication Systems, Journal Year: 2023, Volume and Issue: 83(2), P. 189 - 208

Published: May 8, 2023

Language: Английский

Citations

1

Decentralized blockchain-based security enhancement with lamport merkle digital signature generation and optimized encryption in cloud environment DOI

Sachi Pandey,

Ritin Behl,

Amit Kumar Sinha

et al.

Multimedia Tools and Applications, Journal Year: 2023, Volume and Issue: 83(16), P. 47269 - 47293

Published: Oct. 26, 2023

Language: Английский

Citations

1