A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

[PDF][PDF] Introduction to the data mining techniques in cybersecurity

IE Salem, MM Mijwil, AW Abdulqader… - Mesopotamian journal of …, 2022 - iasj.net
As a result of the evolution of the Internet and the massive amount of data that is transmitted
every second, as well as the methods for protecting and preserving it and distinguishing …

[HTML][HTML] IoT data security in outsourced databases: A survey of verifiable database

A Chen, S Yu, X Yang, D Huang, Y Ren - Heliyon, 2024 - cell.com
With the swift advancement of cloud computing and the Internet of Things (IoT), to address
the issue of massive data storage, IoT devices opt to offload their data to cloud servers so as …

Integrity coded databases-protecting data integrity for outsourced databases

J Yeh, MM Arifin, N Shen, U Karki, Y Xie… - Computers & …, 2024 - Elsevier
In recent years, cloud storage has become a viable option for businesses to store and
retrieve information. This storage service allows its clients releasing from financial burden of …

New attacks on secret sharing-based data outsourcing: toward a resistant scheme

P Rahmani, SM Fakhrahmad, M Taheri - The Journal of Supercomputing, 2022 - Springer
In this paper, two new practical attacks on some secret sharing-based data outsourcing
schemes are first introduced, and several other security and performance issues with the …

Blockchain assisted blind signature algorithm with data integrity verification scheme

P Shrivastava, B Alam, M Alam - … and Computation: Practice …, 2024 - Wiley Online Library
As the demand for cloud storage systems increases, ensuring the security and integrity of
cloud data becomes a challenge. Data uploaded to cloud systems are vulnerable to …

Comment on" Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud"

CD Kumar, LK Biswas, S Mookherji… - arXiv preprint arXiv …, 2023 - arxiv.org
In 2022, Neela and Kavitha proposed an improved RSA encryption algorithm (IREA) for
cloud environment. In this paper, we review and comment on the correctness of the IREA …

Enhanced data integrity encryption algorithm for cloud computing

MP Mothlabeng, TE Mathonsi… - … Big Data, Computing …, 2022 - ieeexplore.ieee.org
Cloud computing storage services allow people to easily maintain and manage large
amounts of data at a low cost. However, it cannot guarantee data integrity. Data is …

Blockchain based Quantum Resistant Signature Algorithm for Data Integrity Verification in Cloud and Internet of Everything

P Shrivastava, B Alam, M Alam - EAI Endorsed Transactions on …, 2024 - publications.eai.eu
INTRODUCTION: The processing and storage capacities of the Internet of Everything (IoE)
platform are restricted, but the cloud can readily provide efficient computing resources and …

Analysis and Implementation of Digital Signature Algorithm in PDF Document

MR Ramadhan, S Mandala… - 2023 11th International …, 2023 - ieeexplore.ieee.org
A digital signature is a cryptographic tool used to sign and verify messages to provide
authentication, integrity, and non-repudiation of an electronic document. Digital signatures …