2022
DOI: 10.1016/j.jksuci.2019.10.006
|View full text |Cite
|
Sign up to set email alerts
|

RSA based encryption approach for preserving confidentiality of big data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(20 citation statements)
references
References 19 publications
0
16
0
Order By: Relevance
“…Moreover, the adopted SM‐AO model was computed over extant optimization schemes such as AO, LA, ROA, SSO, and PRO schemes. In addition, the adopted SM‐AO model was computed over extant encryption schemes such as CP‐ABE, 35 NLCA, 36 AES, 37 blowfish, 38 ECC, 39 RSA, 40 and El‐gamal 41 . Further, analysis was done regarding time metrics and attacks like CPA, CCA, KPA and KCA.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, the adopted SM‐AO model was computed over extant optimization schemes such as AO, LA, ROA, SSO, and PRO schemes. In addition, the adopted SM‐AO model was computed over extant encryption schemes such as CP‐ABE, 35 NLCA, 36 AES, 37 blowfish, 38 ECC, 39 RSA, 40 and El‐gamal 41 . Further, analysis was done regarding time metrics and attacks like CPA, CCA, KPA and KCA.…”
Section: Resultsmentioning
confidence: 99%
“…Actually, the key sensitivity in terms of correlation should be minimal for better system performance. In that way, the adopted model is found to accomplish least key sensitivity outcomes over compared models like AO, LA, ROA, SSO, and PRO, CP-ABE, 35 NLCA, 36 AES, 37 blowfish, 38 ECC, 39 RSA, 40 and El-gamal. 41 On examining 1st dataset, the key Sensitivity values gained by SM-AO is much minimal than other models.…”
Section: Key Sensitivity Analysismentioning
confidence: 98%
“…The most common definition of information security is that information cannot be disclosed to anyone. It is a combination of three main components, i.e., security, privacy, and accessibility [3,4]. Sharing information nowadays can pose jeopardy to any organisation and any user's privacy.…”
Section: Introductionmentioning
confidence: 99%
“…RSA [2] is the best well-known public key cryptography. It is chosen to apply with a variety of applications to secure the information such as [3], [4], [5], [6], [7], [8]. However, to avoid intruder attacks, the modulus bit length (n) should be assigned at least 1024 bits.…”
Section: Introductionmentioning
confidence: 99%