Enhancing the security of cloud data using hybrid encryption algorithm

KR Sajay, SS Babu, Y Vijayalakshmi - Journal of Ambient Intelligence and …, 2019 - Springer
Cloud computing is a term which is employed to explain different concepts of computing that
includes several PCs linked through a real time network of communication such as internet …

Issues and challenges in cloud storage architecture: a survey

A Ghani, A Badshah, S Jan, AA Alshdadi… - arXiv preprint arXiv …, 2020 - arxiv.org
From home appliances to industrial enterprises, the Information and Communication
Technology (ICT) industry is revolutionizing the world. We are witnessing the emergence of …

HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud

P Chinnasamy, P Deepalakshmi - Journal of Ambient Intelligence and …, 2022 - Springer
Technology that is perfect is free of vulnerability. Technological growth offers users online
data storage and access to it from anywhere. Cloud computing is a model that provides data …

[HTML][HTML] A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing

F Thabit, O Can, S Alhomdy, GH Al-Gaphari… - International Journal of …, 2022 - Elsevier
Cloud computing is a technology in which the resources are delivered as services. Users
can access them anywhere, anytime via the Internet without any need to know the …

Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system

M Khan, F Masood, A Alghafis - Neural Computing and Applications, 2020 - Springer
In this article, our aim is to design a new and efficient digital information confidentiality
mechanism. We have offered an encryption scheme which is based on fractals and multiple …

Design of secure storage for health-care cloud using hybrid cryptography

P Chinnasamy, P Deepalakshmi - 2018 second international …, 2018 - ieeexplore.ieee.org
More recently, any technology can't be stated perfect until it's totally free of any vulnerability.
There are many technologies has grown in day-to-day life that offer online data storage …

Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud

MB Qureshi, MS Qureshi, S Tahir, A Anwar, S Hussain… - Symmetry, 2022 - mdpi.com
With technological advancement, cloud computing paradigms are gaining massive
popularity in the ever-changing technological advancement. The main objective of the cloud …

An efficient lightweight image encryption scheme using multichaos

A Ullah, AA Shah, JS Khan, M Sajjad… - Security and …, 2022 - Wiley Online Library
With an immense increase in Internet multimedia applications over the past few years, digital
content such as digital images are stored and shared over global networks, the probability …

EverSSDI: blockchain-based framework for verification, authorisation and recovery of self-sovereign identity using smart contracts

T Zhou, X Li, H Zhao - International Journal of Computer …, 2019 - inderscienceonline.com
In the current identity management process, the problems such as increasing differentiation
of digital identities, fragmentation and centralisation of identity information have been …

Analysis of the smoothing and payload distribution method on reversible audio steganography

MM Amrulloh, T Ahmad… - 2023 14th International …, 2023 - ieeexplore.ieee.org
Along with the rampant theft of confidential data, technological security systems are the most
important thing in the digitalization era. Data cannot be said to be safe from third parties …