2022
DOI: 10.1007/s11128-022-03452-6
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(22 citation statements)
references
References 13 publications
0
22
0
Order By: Relevance
“…It reveals the correlation between ambiguity and randomness. Hyperentropy He: it is the uncertainty measure of entropy, namely the entropy of entropy, which reflects the cohesion of the uncertainty of all points representing the language value in the number domain space, that is, the cohesion of cloud droplets [10].…”
Section: Basic Conceptsmentioning
confidence: 99%
“…It reveals the correlation between ambiguity and randomness. Hyperentropy He: it is the uncertainty measure of entropy, namely the entropy of entropy, which reflects the cohesion of the uncertainty of all points representing the language value in the number domain space, that is, the cohesion of cloud droplets [10].…”
Section: Basic Conceptsmentioning
confidence: 99%
“…Sundar [20] presented an enhanced cloud security model based on QKD protocol (ECSM-QKDP) to provide cloud storage security. This research assumed the communication scenario among three objects such as data owner, cloud server and Legitimate User (LU) whereas the quantum keys are exchanged in two steps.…”
Section: Related Workmentioning
confidence: 99%
“…In the proposed modified key sifting scheme (MKSS), the TPM [21] is used to perform the error correction TWIA process. The quantum channel exchange is performed similar to the conventional BB84 [20], but the modification is accomplished in public channel exchange. The ECSM-QKDP [20] is performed using pseudo random number, but the proposed MKSS synchronizes the random number in cloud storage.…”
Section: Error Correction Using Tpm For Mkssmentioning
confidence: 99%
See 1 more Smart Citation
“…A feedback-based Index Name Server scheme is presented in which monitors various indexing and based on the feedback the method performs load balancing. An e cient data deduplication scheme is presented in [7], which reduce the storage overhead. A temporal approach is presented in which works based on hash values towards encryption.…”
Section: Related Workmentioning
confidence: 99%