2022
DOI: 10.1155/2022/4206000
|View full text |Cite|
|
Sign up to set email alerts
|

An Enhanced Dynamic Nonlinear Polynomial Integrity-Based QHCP-ABE Framework for Big Data Privacy and Security

Abstract: Topics such as computational sources and cloud-based transmission and security of big data have turned out to be a major new domain of exploration due to the exponential evolution of cloud-based data and grid facilities. Various categories of cloud services have been utilized more and more widely across a variety of fields like military, army systems, medical databases, and more, in order to manage data storage and resource calculations. Attribute-based encipherment (ABE) is one of the more efficient algorithm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 41 publications
(67 reference statements)
0
2
0
Order By: Relevance
“…Franson Interferometers were used to create a QKD standard in [24], but they lacked security. To secure cloud data, a dynamic, non-linear, and randomized quantum hash scheme was created [25]. A dynamic, non-linear, and randomized equation creates a chaotic key for encryption and decryption in this system.…”
Section: Related Workmentioning
confidence: 99%
“…Franson Interferometers were used to create a QKD standard in [24], but they lacked security. To secure cloud data, a dynamic, non-linear, and randomized quantum hash scheme was created [25]. A dynamic, non-linear, and randomized equation creates a chaotic key for encryption and decryption in this system.…”
Section: Related Workmentioning
confidence: 99%
“…The algorithm allows for the aring of secure keys while detecting any attempt of eavesdropping. [30][31][32][33][34][35][36] Across the globe, cloud providers facilitate the migration of cloud-based applications, software, and substantial data repositories into expansive data centers. However, a notable dilemma emerges as cloud users lack direct oversight over the information housed within these data centers.…”
Section: Related Workmentioning
confidence: 99%
“…This comprehensive method of key prior-dissemination techniques require stable computational and transmission costs. Developing the key policy-ABE process [35], Wang et al introduced a novel technique that stimulates portable node platform info security and consumer access annulment. The authors blended lethargic reencipherment and substitution-based re-encipherment concepts to attain consumer rights, privacy, consumer private key responsibility, and to decrease operating expenses.…”
Section: Drawbacks Of Conventional Attribute Encipherment Approachesmentioning
confidence: 99%