2021
DOI: 10.1080/09720529.2020.1859799
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid cryptography technique for data storage on cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…If you can use multiple algorithms of different types to increase the encryption's power, you can integrate the speed and strength of the two algorithms. This method is used to assure safe cloud storage systems [12]. For instance, two approaches here are used to demonstrate the difference between less secure and more secure systems.…”
Section: Hybrid Cryptographymentioning
confidence: 99%
See 2 more Smart Citations
“…If you can use multiple algorithms of different types to increase the encryption's power, you can integrate the speed and strength of the two algorithms. This method is used to assure safe cloud storage systems [12]. For instance, two approaches here are used to demonstrate the difference between less secure and more secure systems.…”
Section: Hybrid Cryptographymentioning
confidence: 99%
“…Each part is encrypted using three different cryptographic techniques, such as Blowfish (BF), MessageDigest (MD5), and AES. The merged areas are then combined into one file and re-loaded to the cloud [12].…”
Section: Encryption Phasementioning
confidence: 99%
See 1 more Smart Citation
“…Ali et al [17] presented a data protection model which is built using a hybrid of cryptographic algorithm. They applied Advanced Encryption Standard (AES), Blowfish and Message-Digest algorithm (MD5) for the data protection model.…”
Section: Related Work On Data Storage Securitymentioning
confidence: 99%
“…They argued that their solution provides speed and robust data encryption. Despite the hybrid cryptographic approach by Ali et al [17], their scheme is unable to detect and correct errors but they had their attention on data protection.…”
Section: Related Work On Data Storage Securitymentioning
confidence: 99%