2021
DOI: 10.1007/s11277-021-08924-z
|View full text |Cite
|
Sign up to set email alerts
|

QMLFD Based RSA Cryptosystem for Enhancing Data Security in Public Cloud Storage System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…However, owing to publically available parameters, the keys generated with the ECC were vulnerable to bruteforce attacks. (Kaliyamoorthy & Ramalingam, 2022)developed a cryptosystem for data security enhancement on public cloud storage. For resolving the issue grounded on the data integrity on the public cloud, Quasi Modified Levi Flight Distribution for Rivest Shamir Adleman cryptosystem (QMLFD-RSA) was wielded.…”
Section: Literature Surveymentioning
confidence: 99%
“…However, owing to publically available parameters, the keys generated with the ECC were vulnerable to bruteforce attacks. (Kaliyamoorthy & Ramalingam, 2022)developed a cryptosystem for data security enhancement on public cloud storage. For resolving the issue grounded on the data integrity on the public cloud, Quasi Modified Levi Flight Distribution for Rivest Shamir Adleman cryptosystem (QMLFD-RSA) was wielded.…”
Section: Literature Surveymentioning
confidence: 99%
“…In [25], they proposed an approach to secure public cloud from unauthorized users. They used RSA cryptosystem in addition to Qusai modified levy flight distribution (QMLFD-RSA) approach.…”
Section: Performance Comparison Of Xen and Hyper-v…mentioning
confidence: 99%
“…However, it is very difficult and requires considerable time duration to factorize them [44]. As asymmetric cryptosystem, RSA is the most algorithm used with other cryptosystem, such as in [25] and [45] In Table 8, Xen hypervisor has better performance than Hyper-V with big variation while encryption and decryption in terms of time duration and CPU utilization.…”
Section: Rsamentioning
confidence: 99%