Encryption as a service for IoT: Opportunities, challenges, and solutions
The widespread adoption of Internet of Things (IoT) technology has introduced new
cybersecurity challenges. Encryption services are being offloaded to cloud and fog platforms …
cybersecurity challenges. Encryption services are being offloaded to cloud and fog platforms …
Efficient data security using hybrid cryptography on cloud computing
P Chinnasamy, S Padmavathi, R Swathy… - … : Proceedings of ICICCT …, 2021 - Springer
Services are distributed among all servers and between the users and individuals in the
cloud environment. Cloud providers have trouble guaranteeing file protection as security is …
cloud environment. Cloud providers have trouble guaranteeing file protection as security is …
HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud
Technology that is perfect is free of vulnerability. Technological growth offers users online
data storage and access to it from anywhere. Cloud computing is a model that provides data …
data storage and access to it from anywhere. Cloud computing is a model that provides data …
Design of secure storage for health-care cloud using hybrid cryptography
More recently, any technology can't be stated perfect until it's totally free of any vulnerability.
There are many technologies has grown in day-to-day life that offer online data storage …
There are many technologies has grown in day-to-day life that offer online data storage …
[PDF][PDF] Enhancing data security in cloud computing using a lightweight cryptographic algorithm
Cloud computing is a new architecture that has released users from hardware requirements
and complexity. The rapid transition toward clouds has advanced many concerns related to …
and complexity. The rapid transition toward clouds has advanced many concerns related to …
Encryption as a service (eaas): Introducing the full-cloud-fog architecture for enhanced performance and security
The main goal of Encryption as a Service (EaaS) is to deliver cryptography services to
limited-resource devices. However, due to the massive number of devices connecting EaaS …
limited-resource devices. However, due to the massive number of devices connecting EaaS …
AES hardware accelerator on FPGA with improved throughput and resource efficiency
M Baby Chellam, R Natarajan - Arabian Journal for Science and …, 2018 - Springer
With the increase in computation and data storage in cloud servers, the need for a dedicated
hardware accelerator for encryption is arising in order to reduce the processor job. High …
hardware accelerator for encryption is arising in order to reduce the processor job. High …
An adaptive encryption-as-a-service architecture based on fog computing for real-time substation communications
The recent outbreak of industrial cyberattacks indicates that the current industrial network
security architecture is under serious challenges. As one of the critical industrial networks …
security architecture is under serious challenges. As one of the critical industrial networks …
[PDF][PDF] Development of secure cloud based storage using the elgamal hyper elliptic curve cryptography with fuzzy logic based integer selection
AP Pandian - Journal of Soft Computing Paradigm, 2020 - scholar.archive.org
The technological advancements in the field of the information and communication
technology led to the development of more promising cloud paradigm that allows online …
technology led to the development of more promising cloud paradigm that allows online …
[HTML][HTML] On the Significance of Cryptography as a Service
N Rahimi, JJ Reed, B Gupta - Journal of Information Security, 2018 - scirp.org
Cryptography as a service is becoming extremely popular. It eases the way companies deal
with securing their information without having to worry about their customer's information …
with securing their information without having to worry about their customer's information …