2015 17th UKSim-AMSS International Conference on Modelling and Simulation (UKSim) 2015
DOI: 10.1109/uksim.2015.74
|View full text |Cite
|
Sign up to set email alerts
|

A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…To maintain data security and con dentiality, many data security sectors have evolved [23]. Cloud storage is useful for many applications, but it exposes data to programs with security aws [24].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…To maintain data security and con dentiality, many data security sectors have evolved [23]. Cloud storage is useful for many applications, but it exposes data to programs with security aws [24].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Notably, the e ciency of the AES algorithm is consistent on both software and hardware platforms. Its effectiveness is attributed to the systematic execution of encryption and decryption processes, making it a widely accepted and secure choice for various applications [22]. Cloud security and data security are key concerns nowadays, hence cryptographic methods are needed.…”
Section: Aes Algorithmmentioning
confidence: 99%
“…The function of these four modules is explained below. 25,26 User authentication process: It accepts the access request from the users and further verifies whether the user is authorized or unauthorized. By means of this user authentication process, the security can be improved by blocking the entry of an unauthorized user.…”
Section: Ontology-based Data Access Controlmentioning
confidence: 99%
“…Cloud computing is suffering from a number of known vulnerabilities, which enable attackers to steal information from cloud users. In the world of computing, security, privacy and access control issues are a major concern of cloud computing [10][11]. There are many studies have been conducted to improve the security and protect the privacy of user's data at the cloud servers.…”
Section: Existing Solutions For Security Issuesmentioning
confidence: 99%