Efficient data security using hybrid cryptography on cloud computing

P Chinnasamy, S Padmavathi, R Swathy… - … : Proceedings of ICICCT …, 2021 - Springer
Services are distributed among all servers and between the users and individuals in the
cloud environment. Cloud providers have trouble guaranteeing file protection as security is …

A hybrid secure cloud platform maintenance based on improved attribute-based encryption strategies

A Kumar, SA Kumar, V Dutt, AK Dubey, S Narang - IJIMAI, 2023 - dialnet.unirioja.es
In the modern era, Cloud Platforms are the most needed port to maintain documents
remotely with proper security norms. The concept of cloud environments is similar to the …

Security and detection mechanism in IoT-based cloud computing using hybrid approach

M Vashishtha, P Chouksey, DS Rajput… - … Journal of Internet …, 2021 - inderscienceonline.com
The combination of RSA and RC4 is accepted for the generation of key to get the superior
security method, on image, blowfish algorithm is applied. In this method, initially cloud …

Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud

MB Qureshi, MS Qureshi, S Tahir, A Anwar, S Hussain… - Symmetry, 2022 - mdpi.com
With technological advancement, cloud computing paradigms are gaining massive
popularity in the ever-changing technological advancement. The main objective of the cloud …

[PDF][PDF] Content sniffing attack detection in client and server side: A survey

BS Thakur, S Chaudhary - International Journal of Advanced Computer …, 2013 - Citeseer
In today's environment we cannot think about internet. It has the interface of client and
server. After analysing several research studies, we conclude that the communication …

Data security in cloud architecture based on Diffie Hellman and elliptical curve cryptography

R Ganesan - Cryptology ePrint Archive, 2014 - eprint.iacr.org
Technological advancements in cloud computing due to increased connectivity and
exponentially proliferating data has resulted in migration towards cloud architecture. Cloud …

Enhanced RSA algorithm with varying key sizes for data security in cloud

IG Amalarethinam, HM Leena - 2017 World Congress on …, 2017 - ieeexplore.ieee.org
Cloud Computing is a distributed and centralized network of inter connected and inter
related systems with one or more IT resources provisioned based on pay-on-demand usage …

Modified RSA cryptosystem based on offline storage and prime number

R Patidar, R Bhartiya - 2013 IEEE International Conference on …, 2013 - ieeexplore.ieee.org
The most common public key algorithm is RSA cryptosystem used for encryption and
decryption. It is the first public key algorithm which provides security to transfer and saving of …

RETRACTED ARTICLE: Modified adaptive neuro fuzzy inference system based load balancing for virtual machine with security in cloud computing environment

TJB Durga Devi, A Subramani, P Anitha - Journal of Ambient Intelligence …, 2021 - Springer
In a heterogeneous environment, computation over internet is provided by a popular
paradigm called cloud computing. In a cloud heterogeneous environment, service providing …

Cloud computing: An emerging technology

D Xu - 2010 International Conference On Computer Design …, 2010 - ieeexplore.ieee.org
Cloud Computing is a novel buzzword in information technology domain. It's an emerging
technology and it has been give much attention by both research community and industries …