2020
DOI: 10.1088/1757-899x/981/2/022039
|View full text |Cite
|
Sign up to set email alerts
|

Competent multi-level encryption methods for implementing cloud security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…MLS was developed by US Military in 1970 [10], that is considered one of the computer applications that protects data in Operating Systems, Networks and Databases by classifying data and users to different security levels. Many organizations utilize MLS security during its operation, such that SELinux [11], Oracle Label Security (OLS)[12], MLChat[13] and cloud security [14]. Actually, there are four levels of security: Top Secret (TS), Secret (S), Confidential (C), Unclassified (U).…”
Section: Multilevel Security (Mls)mentioning
confidence: 99%
“…MLS was developed by US Military in 1970 [10], that is considered one of the computer applications that protects data in Operating Systems, Networks and Databases by classifying data and users to different security levels. Many organizations utilize MLS security during its operation, such that SELinux [11], Oracle Label Security (OLS)[12], MLChat[13] and cloud security [14]. Actually, there are four levels of security: Top Secret (TS), Secret (S), Confidential (C), Unclassified (U).…”
Section: Multilevel Security (Mls)mentioning
confidence: 99%
“…Chinnasamy et al [15] explained the weakness of traditional symmetric and asymmetric algorithm and proposed a new algorithm that is the combination of ECC and Blowfish, which provides the high security and confidentiality to the data. Tallapally and Manjula [16] proposed a multilevel security scheme that provide more security as compare to single level security in encryption. The proposed algorithm is faster and safe in multiple direction.…”
Section: Related Workmentioning
confidence: 99%
“…Just the approved individuals can unscramble the information since the will require the keys. In the encryption-unscrambling measure, the individual who scrambles the information must give the beneficiaries the capacity to translate the information either by providing the manual or passwords or by the utilization of computerized decoding programming [16]- [18] The advanced encryption standard (AES) is a symmetric square code picked by the U.S. government to secure grouped data. AES is executed in programming and equipment all through the world to scramble touchy information.…”
mentioning
confidence: 99%