735 Hits in 8.3 sec

Subject Review: Cloud Computing Security Based on Cryptography

Amal Abdulbaqi Maryoosh, Rana Saad Mohammed, Raniah Ali Mustafa
2019 International Journal of Engineering Research and Advanced Technology  
But the security concern is the main reason that makes companies afraid of using cloud computing and store their data on cloud servers.  ...  In this paper, we try to review and describe many encryption methods that used to protect data which stored in cloud computing and make a comparison among these methods.  ...  Year Privacy and security mechanism Confidentiality Integrity Authentication Syam and Subramanian [4] 2011 ECC and Sobol sequence   Arjun et al. [5] 2012 ECC and ECDH key exchange algorithm  ... 
doi:10.31695/ijerat.2019.3569 fatcat:rvdbp6jztbaj7nm4c3klwdchwe

Privacy Preserving Image Encryption Approach for Cloud Storage

Mohamed Jafar Sadik
2020 International Journal of Advanced Trends in Computer Science and Engineering  
Therefore, in this paper, a new encryption approach for medical images in cloud storage is proposed to handle privacy preserving image retrieval from the cloud.  ...  Results show that the proposed image encryption approach enhances the speed of the encryption process significantly and manage some powerful security features.  ...  That demonstrates that the proposed mechanism can fit with the requirement of cloud-based storage where the image size is decreased while encoded using a highly secure algorithm.  ... 
doi:10.30534/ijatcse/2020/61942020 fatcat:a5e32q3ju5amlbhsmljjogi3lm

Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System

Mustafa A. Al Sibahee, Songfeng Lu, Zaid Ameen Abduljabbar, Xin Liu, Hemn Barzan Abdalla, Mohammed Abdulridha Hussain, Zaid Alaa Hussien, Mudhafar Jalil Jassim Ghrabat
2020 IEEE Access  
ECC is used to ensure the confidentiality of the digital signatures and secure key exchange.  ...  [24] used ECC-ElGamal encryption to develop a lightweight authentication scheme by utilizing ECC with Public Key Infrastructure (PKI) to generate a secret key and exchange it between D2D devices over  ...  Security features Moh seni et al. [22] Alizai et al. [23] Adeel et al. [24] Chen et al. [30] Byou ngjin Seok et al. [31] Our proposed work  ... 
doi:10.1109/access.2020.3041809 fatcat:udskc42syvft3eplhdlalkefce

A Novel Symmetric Key Generation Technique for Securing Images in the Cloud: A Comparative Study

Pallavi Kulkarni
2020 Bioscience Biotechnology Research Communications  
To address the above mentioned problem, we propose a new method to secure the images in the cloud environment.  ...  Today, the rate at which the image data set produced is exponential in nature.  ...  In this paper we have presented a technique to enhance the security of image by using a novel key generation technique.  ... 
doi:10.21786/bbrc/13.13/10 fatcat:sijl5z5x25bqldmk2y6niox3hm

Private cloud security: Secured user authentication by using enhanced hybrid algorithm

Nikhil Gajra, Shamsuddin S. Khan, Pradnya Rane
2014 2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)  
This research focuses on mechanism, the hybrid of AES and Blowfish for encryption. For key management and key exchange hashing is used.  ...  However, we must provide security guarantees not only on authentication but also on files over the cloud for the outsourced data, which is now maintained by third parties such as cloud providers.  ...  For key management and key exchange, Key is generated by the ECC key generator and then we may use Key agreement which can be done by Diffie-Hellman.  ... 
doi:10.1109/eic.2015.7230712 fatcat:mtbmkswr5zgcvaregzdzgvbf3m


Nur Nabila Mohamed, Yusnani Mohd Yussof, Mohammed Ahmed Saleh, Habibah Hashim
2020 Journal of Information and Communication Technology  
In addition, AES and ECC have been found to be the most popular methods used in the hybrid approach due to its computing speed and security resistance among other schemes.  ...  efficiency of securing data and solving the issue of key distribution.  ...  Bhave and Jajoo (2015) combined the AES-ECC to secure key exchange and enhanced ciphertext security.  ... 
doi:10.32890/jict2020.19.3.1 fatcat:dnur6fbzvve4jockrantiqwd5q

A Hybrid Encryption Algorithm for Security Enhancement of Wireless Sensor Networks: A Supervisory Approach to Pipelines

Omid Mahdi Ebadati E., Farshad Eshghi, Amin Zamani
2020 CMES - Computer Modeling in Engineering & Sciences  
Cryptographic algorithms have a good role in information security for wireless sensor networks.  ...  Now, various types of cryptographic algorithms provide security in networks, but there are still some problems.  ...  Conflicts of Interest: I hereby declare that there is no conflict of interest related to this manuscript (article) entitled "Fusion of Medical Images in Wavelet Domain: A Hybrid Implementation" with manuscript  ... 
doi:10.32604/cmes.2020.08079 fatcat:thissiwhpvfyzbxf6pvic4n5x4

A Secure ECC-based Electronic Medical Record System

Kun-Lin Tsai, Fang-Yie Leu, Tien-Han Wu, Shin-shiuan Chiou, Yu-Wei Liu, Han-Yun Liu
2014 Journal of Internet Services and Information Security  
Therefore, in this paper, we propose a secure EMR service system, named the ECC-based Secure EMR System (ESEMR for short) which employs a cloud database, an ECC integration unit, a smart card, and portable  ...  Compared with a popular cryptosystem, the RSA, under the same security level, Elliptic Curve Cryptography (ECC) requires shorter length of a key than RSA does.  ...  The authentication scheme is based on ECC and provides the proper mutual authentication between the user and the cloud database.  ... 
doi:10.22667/jisis.2014.02.31.047 dblp:journals/jisis/TsaiLWCLL14 fatcat:mvn73mx25jdibbbok2dltdeoma

Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment

Dilip Venkata Kumar Vengala, D. Kavitha, A. P. Siva Kumar
2021 Complex & Intelligent Systems  
To shun such issues, this paper proposed a Modified ECC centred secure data transfer and a '3'-factor authentication scheme in the untrusted cloud environment.  ...  The proposed work comprises '3' steps: authentication, data compression, and safe data transfer. In the authentication phase, the SHA-512 algorithm along with CCP is utilized.  ...  This paper proposed a Modified ECC-based secure data transfer and three-factor authentication system in the untrusted cloud environment to improve SL in the CC environment.  ... 
doi:10.1007/s40747-021-00305-0 fatcat:lcxw7ucrufh23jsbnoqp3no27q

Security of Broadcast Authentication for Cloud-Enabled Wireless Medical Sensor Devices in 5G Networks

Abdullah Al Hayajneh, Md Zakirul Alam Bhuiyan, Ian McAndrew
2020 Computer and Information Science  
Therefore, authentication plays an important role in securing cloud-based WBANs.  ...  In this article, we explore the security and privacy issues of Wireless Body Area Network combined with Mobile Cloud Computing (wMCC) with 5G mobile networks and investigate public-key based security solutions  ...  Security Issues of wMCC in 5G In this paper, we consider the implementation and evaluation of a security mechanism that is suitable for cloud-based WBAN.  ... 
doi:10.5539/cis.v13n2p13 fatcat:43yogtegtvbnzfp2x2hn62l47u

A lightweight hybrid encryption technique to secure IoT data transmission

Tenzin Kunchok, Prof Kirubanand V. B
2018 International Journal of Engineering & Technology  
This paper proposes a lightweight hybrid encryption system using ECDH key exchange mechanism for generating keys and establishing connection, digital signature for authentication, thereafter AES algorithm  ...  The proposed combination is referred to as "three way secured data encryption mechanism" which interpret all the 3 protection schemes of authentication, info security and verification with the characteristics  ...  ECDHA has been useful for key exchange, ECDSA for digital signature and MD5 is used for authentication.  ... 
doi:10.14419/ijet.v7i2.6.10776 fatcat:jz4suihz5ngvlegezeayzy2ru4

Hybrid AES-ECC Model for the Security of Data over Cloud Storage

Saba Rehman, Nida Talat Bajwa, Munam Ali Shah, Ahmad O. Aseeri, Adeel Anjum
2021 Electronics  
Many algorithms and protocols have been developed to maintain the security and integrity of the data using cryptographic algorithms such as the Elliptic Curve Cryptography (ECC).  ...  in different locations.  ...  Due to the low-key size, the enhancement of ECC is much better than other cryptographic techniques. AES in combination with ECC can do a lot better with the optimization and security of the data.  ... 
doi:10.3390/electronics10212673 fatcat:f3yyjaqlznexvc5schzdyxaw4a

Side-by-Side Analysis of Key Exchange Algorithms for Load Optimized Security in MQTT Protocol

2020 International journal of recent technology and engineering  
This work further demonstrates how to use the proposed algorithm to enable lightweight key exchange mechanism among MQTT devices.  ...  Things connected in open Internet poses high security risks. Majority of these devices use Message Queuing Telemetry Transport (MQTT) protocol for exchanging information.  ...  Key exchange in MQTT using ECC VII.  ... 
doi:10.35940/ijrte.f8987.038620 fatcat:ed2giuuzwbfypp5wclp4qmzbxy

Performance Analysis of Hybrid Cryptography System for High Security and Cloud-Based Storage

R. Bhagyalakshmi, Roopashree D., Shruthi K. N
2022 WSEAS Transactions on power systems  
The cryptographic with holomorphic based data encryption and interchange of information is exchanged and then accumulated in the cloud through holomorphic encryption which uses point addition and doubling  ...  can perform with a fixed key.  ...  more effective approach for ensuring secure data exchange in the cloud.  ... 
doi:10.37394/232016.2022.17.25 fatcat:bltaf2f34vhqfc2eeyzbn67tii

Design of ECC based Secured Cloud Storage Mechanism for Transaction Rich Applications

V. Gopinath, R. S. Bhuvaneswaran
2018 Computers Materials & Continua  
With ECC based security scheme, the security level of the protected system will be increased and it is more suitable to secure the delivered data in the portable devices.  ...  This paper proposes a safe storage mechanism using Elliptic curve cryptography (ECC) for the Transaction Rich Applications (TRA).  ...  So we are in need to enhance the security mechanism to provide high level security with cost saving, high performance and bandwidth.  ... 
doi:10.32604/cmc.2018.04006 fatcat:boy4ahaaz5c5pip5fbd2dqgnhi
« Previous Showing results 1 — 15 out of 735 results