Encryption as a service for IoT: Opportunities, challenges, and solutions

A Javadpour, F Ja'fari, T Taleb, Y Zhao… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The widespread adoption of Internet of Things (IoT) technology has introduced new
cybersecurity challenges. Encryption services are being offloaded to cloud and fog platforms …

Efficient data security using hybrid cryptography on cloud computing

P Chinnasamy, S Padmavathi, R Swathy… - … : Proceedings of ICICCT …, 2021 - Springer
Services are distributed among all servers and between the users and individuals in the
cloud environment. Cloud providers have trouble guaranteeing file protection as security is …

HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud

P Chinnasamy, P Deepalakshmi - Journal of Ambient Intelligence and …, 2022 - Springer
Technology that is perfect is free of vulnerability. Technological growth offers users online
data storage and access to it from anywhere. Cloud computing is a model that provides data …

Design of secure storage for health-care cloud using hybrid cryptography

P Chinnasamy, P Deepalakshmi - 2018 second international …, 2018 - ieeexplore.ieee.org
More recently, any technology can't be stated perfect until it's totally free of any vulnerability.
There are many technologies has grown in day-to-day life that offer online data storage …

[PDF][PDF] Enhancing data security in cloud computing using a lightweight cryptographic algorithm

S Belguith, A Jemai, R Attia - 11th International Conference on …, 2015 - researchgate.net
Cloud computing is a new architecture that has released users from hardware requirements
and complexity. The rapid transition toward clouds has advanced many concerns related to …

Encryption as a service (eaas): Introducing the full-cloud-fog architecture for enhanced performance and security

A Javadpour, F Ja'fari, T Taleb… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The main goal of Encryption as a Service (EaaS) is to deliver cryptography services to
limited-resource devices. However, due to the massive number of devices connecting EaaS …

AES hardware accelerator on FPGA with improved throughput and resource efficiency

M Baby Chellam, R Natarajan - Arabian Journal for Science and …, 2018 - Springer
With the increase in computation and data storage in cloud servers, the need for a dedicated
hardware accelerator for encryption is arising in order to reduce the processor job. High …

An adaptive encryption-as-a-service architecture based on fog computing for real-time substation communications

H Zhang, B Qin, T Tu, Z Guo, F Gao… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The recent outbreak of industrial cyberattacks indicates that the current industrial network
security architecture is under serious challenges. As one of the critical industrial networks …

[PDF][PDF] Development of secure cloud based storage using the elgamal hyper elliptic curve cryptography with fuzzy logic based integer selection

AP Pandian - Journal of Soft Computing Paradigm, 2020 - scholar.archive.org
The technological advancements in the field of the information and communication
technology led to the development of more promising cloud paradigm that allows online …

[HTML][HTML] On the Significance of Cryptography as a Service

N Rahimi, JJ Reed, B Gupta - Journal of Information Security, 2018 - scirp.org
Cryptography as a service is becoming extremely popular. It eases the way companies deal
with securing their information without having to worry about their customer's information …