2022
DOI: 10.1155/2022/3767912
|View full text |Cite
|
Sign up to set email alerts
|

Key Aggregation Cryptosystem and Double Encryption Method for Cloud-Based Intelligent Machine Learning Techniques-Based Health Monitoring Systems

Abstract: Cloud technology is a business strategy that aims to provide the necessary material to customers depending on their needs. Individuals and cloud businesses alike have embraced the cloud storage service, which has become the most widely used service. The industries outsource their data to cloud storage space to relieve themselves of the load of dealing with redundant data contents. This must be protected to prevent the theft of personal belongings, and privacy must be improved as well. Different research projec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 38 publications
0
6
0
Order By: Relevance
“…The importance of this paper is that the proposed method offers several advantages, particularly in enhancing the security and flexibility of the encryption system. Previous studies have explored strategies like double security with a single key length and the generation of long-length keys to bolster security [ 29 , 30 ]. The existing methods may not be viable in resource-constrained environments [ 31 ].…”
Section: Discussionmentioning
confidence: 99%
“…The importance of this paper is that the proposed method offers several advantages, particularly in enhancing the security and flexibility of the encryption system. Previous studies have explored strategies like double security with a single key length and the generation of long-length keys to bolster security [ 29 , 30 ]. The existing methods may not be viable in resource-constrained environments [ 31 ].…”
Section: Discussionmentioning
confidence: 99%
“…In this equation, gamma is used to indicate the contour parameter which is used to determine the smoothness of the boundary region, and yi and yj are objects I and j, respectively. SVM is the default selection for brain tumor classification because of the features selection and kernel class reparability [15]. There are some terms available that are used to the performance of the SVM algorithm which is below: the First term is accuracy, the Second term is sensitivity, the Third term is specificity [16].…”
Section: Feature Extractionmentioning
confidence: 99%
“…KAC is widely accepted for sharing sensitive data securely and efficiently in a variety of practical application scenarios 23,24 . Nishoni and Tenis 23 utilized KAC to achieve key auditing in secure data transmission while avoiding computationally intensive operations.…”
Section: Related Workmentioning
confidence: 99%
“…Their scheme uses random oracle model and a formal proof of security is absent. The work by Almuzaini et al 24 is an application of KAC for privacy‐preserving machine learning analysis on healthcare data. Their scheme benefits from the constant ciphertext‐size and constant‐size aggregate key of KAC.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation