2022
DOI: 10.1002/ett.4558
|View full text |Cite
|
Sign up to set email alerts
|

Secure forensic data transmission system in cloud database using fuzzy based butterfly optimization and modified ECC

Abstract: Data forensic is the investigation of digital data which illustrates how it is created and utilized. It is composed of detection, preservation, retrieval, and analyzing digital information. These data are stored in different domains. When storing the data in a cloud database it is ineluctable to circumvent the data leakage. Several deep learning approaches were conducted to resist data leakage. However, optimized security was not obtained. To address the aforementioned issues we have proposed a novel modified … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 38 publications
(45 reference statements)
0
4
0
Order By: Relevance
“…Enabling computational efficiency is equally important to ensuring safe communication since realtime applications impose fast and reliable processing. Technically, a cloud is a storage space for digitalized data spread across a number of servers that are overseen by cloud service providers (CSP) [9,10]. Cloud storage is widely utilized to allow for the storage of huge amounts of data known as big-data [11].…”
Section: Introductionmentioning
confidence: 99%
“…Enabling computational efficiency is equally important to ensuring safe communication since realtime applications impose fast and reliable processing. Technically, a cloud is a storage space for digitalized data spread across a number of servers that are overseen by cloud service providers (CSP) [9,10]. Cloud storage is widely utilized to allow for the storage of huge amounts of data known as big-data [11].…”
Section: Introductionmentioning
confidence: 99%
“…The confidentiality of digital evidence should be safeguarded due to the evidence can include sensitive data like credit card data and other individual identifiers. To secure the evidence, severe access control is required or an encryption technique can be employed to make sure that only authorized parties or an investigator access the digital evidence [3]. Confirming the integrity of the digital evidence is a major significant procedure of some digital analysis, as an investigator is required to demonstrate that the evidence is not tampered with or fabricated in some way.…”
Section: Introductionmentioning
confidence: 99%
“…19 Cluster-based approach in data aggregation protocols uses local search method to combined the data and secure energy node in network. [20][21][22][23] The existing data aggregation and routing methods lessen energy consumption through avoiding redundancy in data, but they efficiently lessen the bandwidth and memory. There includes trade-off between security levels, energy consumption, increasing security level includes higher intensive computational operations.…”
Section: Introductionmentioning
confidence: 99%
“…Rules for secured data aggregation (SDA) achieve trade‐offs among network security and features of energy performance 19 . Cluster‐based approach in data aggregation protocols uses local search method to combined the data and secure energy node in network 20–23 …”
Section: Introductionmentioning
confidence: 99%