2021
DOI: 10.3390/electronics10212673
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid AES-ECC Model for the Security of Data over Cloud Storage

Abstract: A cloud computing environment provides a cost-effective way for the end user to store and access private data over remote storage using some Internet connection. The user has access to the data anywhere and at any time. However, the data over the cloud do not remain secure all the time. Since the data are accessible to the end user only by using the interference of a third party, it is prone to breach of authentication and integrity of the data. Moreover, cloud computing allows simultaneous users to access and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(13 citation statements)
references
References 21 publications
(28 reference statements)
0
7
0
Order By: Relevance
“…Comparing the study with [12], we find that the proposed model is reducing the execution time of the algorithm that results in less delay and lower power consumption, so we can find that the proposed model offers a lightweight and fast security solution, fig. 10.…”
Section: -3 Execution Time Of the Algorithmmentioning
confidence: 90%
“…Comparing the study with [12], we find that the proposed model is reducing the execution time of the algorithm that results in less delay and lower power consumption, so we can find that the proposed model offers a lightweight and fast security solution, fig. 10.…”
Section: -3 Execution Time Of the Algorithmmentioning
confidence: 90%
“…The choice of encryption scheme would depend on the system’s specific requirements, such as the level of security required, size of the data, and system performance requirements. Some examples of encryption algorithms to secure health data stored in an external system can be advanced encryption standards, RSA encryption, elliptical curve cryptography, and blowfish [ 67 ]. Using an NFT to represent a patient’s health data makes it possible to maintain a secure and tamper-proof record of the data ownership, access, and use.…”
Section: A Proposed Approach: Nonfungible Token Protocols In Hiementioning
confidence: 99%
“…It describes the analysis report that is related to the analysis, and test used in cloud environments, and it specifies that the cloud service representations are open to these vulnerabilities and threats. More prominence on threats has been applied that are allied with statistics being stocked up and practiced remotely, sharing resources, and the usage of virtualization [3,4].…”
Section: Performance Analysis For the Cloud-based Tramentioning
confidence: 99%
“…The same approach is applied in the cloud storage mechanism for the TRA (banking) customers can get lots of benefits [3,4].…”
Section: Introductionmentioning
confidence: 99%