[PDF][PDF] TPA auditing to enhance the privacy and security in cloud systems

S Kumar, D Kumar, HS Lamkuche - Journal of Cyber Security and …, 2021 - researchgate.net
Over the last decade, many enterprises around the world migrating from traditional
infrastructure to cloud resources in order to cut down operational and capital expenditure …

A collaborative auditing scheme with dynamic data updates based on blockchain

J Xiao, H Huang, C Wu, Q Chen, Z Huang - Connection Science, 2023 - Taylor & Francis
Cloud data auditing is essential to ensure the integrity of cloud data. The main idea of cloud
auditing is to entrust the audit task to a third-party auditor (TPA) with powerful computing …

High-performance multi-function hmac-sha2 fpga implementation

B Kieu-Do-Nguyen, TT Hoang… - 2022 20th IEEE …, 2022 - ieeexplore.ieee.org
Today, Hash-based Message Authentication Code with Secure Hash Algorithm 2 (HMAC-
SHA2) is widely used in modern protocols, such as in Internet Protocol Security (IPSec) and …

A cloud based secured fully anonymous HMAC encryption algorithm in comparison with diffie Hellman algorithm for improved key exchange

GJ Kumaran, K Logu - AIP Conference Proceedings, 2024 - pubs.aip.org
The aim of the project is to find valid or invalid users from an anonymous vs authorized users
dataset using Hash-based Message Authentication code (HMAC) in Innovative Cloud …

Analysing fully anonymous novel HMAC with ABE algorithm to control cloud data access for reliability

GJ Kumaran, K Logu - AIP Conference Proceedings, 2024 - pubs.aip.org
The goal of this project is to employ the Hash Based Message Authenticate Code (HMAC) in
an Innovative Cloud Service and compare it to the ABE Algorithm in identifying which users …

Comparison of fully anonymous novel HMAC encryption algorithm with IDEA encryption algorithm for secured data retrieval with reduced time

GJ Kumaran, K Logu - AIP Conference Proceedings, 2024 - pubs.aip.org
This paper provides a comprehensive analysis of safe data from novel HMAC cloud
administration with respect to low time consumption in Database Management. In order to …

An analysis of secure and efficient audit service for data integrity in cloud storage

A Karthikeyan, K Devaki - AIP Conference Proceedings, 2023 - pubs.aip.org
Today in fast growing development in technology leads to storage management in all
aspects. Cloud computing is one of the emerging platform which provides highly reliable …

A Novel Speech Steganography Mechanism to Securing Data Through Shift Invariant Continuous Wavelet Transform with Speech Activity and Message Detection in …

S Kumar, AS Yadav, S Kumar - Available at SSRN 4467704, 2023 - papers.ssrn.com
Speech steganography plays the major role in variety of applications including military,
satellite and mobile communications. However, the conventional methods are failed to meet …

Framework for Data Security Using DNA Cryptography and HMAC Technique in Cloud Computing

A Kumar - … Second International Conference on Electronics and …, 2021 - ieeexplore.ieee.org
The main objective of the proposed work is to build a reliable and secure architecture for
cloud servers where users may safely store and transfer their data. This platform ensures …

[PDF][PDF] Fortifying Healthcare Data Security in the Cloud: A Comprehensive Examination of the EPM-KEA Encryption Protocol

US Basha, SK Gupta, W Alawad, SK Kim, S Bharany - researchgate.net
ABSTRACT A new era of data access and management has begun with the use of cloud
computing in the healthcare industry. Despite the efficiency and scalability that the cloud …