2019
DOI: 10.1007/s10257-019-00419-6
|View full text |Cite
|
Sign up to set email alerts
|

Three stage hybrid encryption of cloud data with penta-layer security for online business users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…Subashanthini and Pounambal [32] proposed a method for resolving the security issue in electronic commerce in the business world and presented a unified system for storing image data in the cloud. Integer wavelet transform (IWT), chaotic maps, and the deoxyribose nucleic acid (DNA) encoding rule were combined in a three-organize picture encoding process.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Subashanthini and Pounambal [32] proposed a method for resolving the security issue in electronic commerce in the business world and presented a unified system for storing image data in the cloud. Integer wavelet transform (IWT), chaotic maps, and the deoxyribose nucleic acid (DNA) encoding rule were combined in a three-organize picture encoding process.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Research author Framework Techniques utilized Gai et al [20] Cloud (generally) D2ES Potey et al [21] Amazon Web Homomorphic Vijayakumar et al [22] Healthcare area Diffie-Hellman, AES Mathur et al [58] Cloud (generally) SHA-1, AES Lee et al [25] Heroku AES Biswas et al [26] Online examination system Not used More et al [27] Banking systems ABE and BRE algorithm Attar and Shahin [28] Cloud (generally) AES Abdulhamid [29] Microsoft Azure Blowfish Kumar et al [30] IT organizations Binary tree Sajay [31] Organizations Homographic, Blowfish Subashanthini and Pounambal [32] Electronic commerce IWT, chaotic maps, and DNA Xu et al [33] Electronic healthcare systems Modified Paillier cryptosystem, truth discovery technology, and the Dirichlet distribution Naidu et al [34] Bluemix SHA 512 Philip and Shah [35] Microsoft Azure Biometrics for authentication Malviya and Dave [36] Open cloud Homomorphic, AES Dong et al [37] SecureMR Homomorphic Wu et al [38] mIoT Public key encipherment with keyword search Namasudra [39] IOT ABE, distributed hash network, and identity-based timed-release encryption Sarode and Bhalla [40] MCC AES, RSA, and QR code Wang et al [41] EHR Public key encipherment with conjunctive keyword search Hiemenz and Krämer [42] Geospatial AES Chauhan et al [43] SRM University Teacher's fingerprint, AES Qiu et al [45] EHR Selective encipherment algorithm combined with fragmentation and dispersion Goyal and Kant [46] IT industry AES, SHA-1, and ECC Kumar and Roberts [47] CC Digital signatures Kumar and Shafi [48] CC modified RSA Teng et al [49] Hadoop improved AES Abroshan [50] CC Elliptic curve technique and enhanced Blowfish Awan et al [51] CC Enhanced AES (128) Kumar et al [52] ARPS and CloudSim SMO algorithm Mata et al [53]...…”
Section: Table 1 Framework and Techniques Utilizedmentioning
confidence: 99%
“…There are some that look into DNA-based cryptographic methods. Subashanthini and coauthors [1] projected a tri-stage picture encoding system, which consolidates Integer Wavelet Transform (IWT), turbulent maps, and DNA encoding regulation. This strategy gives an additional degree of safety to pictures moved through different internet business application on distributed stowage.…”
mentioning
confidence: 99%