2021
DOI: 10.1109/access.2021.3115238
|View full text |Cite
|
Sign up to set email alerts
|

Linear Elliptical Curve Digital Signature (LECDS) With Blockchain Approach for Enhanced Security on Cloud Server

Abstract: Cloud computing is a continuously evolving technology that can enhance agility, availability, collaboration and scalability of data. Blockchain has a secure, immutable ledger which maintains all the transactions along with the timestamp. The blockchain framework and cloud computing technology jointly provides different ways of computational cost reduction. The existing methods help to identify the anonymous documents which are given in the form of requests from the cloud server. If the anonymized document requ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 35 publications
(26 reference statements)
0
8
0
Order By: Relevance
“…2: Hash value generation in the Blockchain network [17] The Blockchain technology is employed to validate the user authentication through the hash value function generated for each transaction. The transaction history is stored in an immutable decentralized ledger [18] that ensures the secured channel establishment. The chain of blocks corresponds to the different transactions which are build using the entities like transaction id, previous hash function, user key, private key, password, functional attributes, etc.…”
Section: Authentication Stagementioning
confidence: 99%
“…2: Hash value generation in the Blockchain network [17] The Blockchain technology is employed to validate the user authentication through the hash value function generated for each transaction. The transaction history is stored in an immutable decentralized ledger [18] that ensures the secured channel establishment. The chain of blocks corresponds to the different transactions which are build using the entities like transaction id, previous hash function, user key, private key, password, functional attributes, etc.…”
Section: Authentication Stagementioning
confidence: 99%
“…Blockchain technology verifies the user's authentication process and the hash value function generated using the transaction between the user and the banking server. The transactions performed by the user are will be stored in the hyper-ledger technology [19] which is a distributed enterprisegrade that provides a high level of security. The chain of blocks is composed of multiple transactions which are composed of transaction id, previous transaction id, user's public key, low entropy password, chain code function, functional parameters, etc as depicted in Figure 2.…”
Section: Hash Value Generation Using Blockchain Technologymentioning
confidence: 99%
“…However, in the "cloud chain fusion" system, data may face the risk of being attacked and tampered with in the process of transmission and storage [28]. Data encryption is an effective means to achieve authenticity and security of monitoring data [29]. Junbeom Hur [30] proposed a smart grid data security scheme based on an attribute encryption algorithm.…”
Section: Related Workmentioning
confidence: 99%