The increasing use of cloud computing, especially in commercial, government and healthcare institutions, started with the use of computerized clouds. Clouds store important data, which reduces the cost of management and ensures easy access. To protect this data, cryptographic methods are used to ensure confidentiality of the data, as well as to secure access to user data and increase trust in cloud technology. In our paper, we suggest a new scheme to support an attribute-based encryption system (ABE) that involves multiple parties such as data owners, data users, cloud servers and authority. A verified and authenticated decryption process for the cloud environment is the imperative feature of our proposed architecture. The data owner encrypts their data and sends it to the cloud. The cloud server performs partial decryption and the final decrypted data are shared for users as per their privileges. Thus, the data owner reduces complexity of productivity by delegating the decryption process to the cloud server. Analysis of the experimental results confirms that data access in the electronic cloud atmosphere is safer due to a controlled multiple-users-rights scheme. Our performance evaluation results show that the proposed model condensed the communication overhead and made Digital Imaging and Communications in Medicine (DICOM) more secure.
The state-dependent impulsive dynamical system with boundary constraints is a kind of special but common system in nature. But because of the complexity of the geometry or topological structures of the impulsive surface, it is hard to determine when an event or an impulsive surface is reached. Therefore, a general state-dependent impulsive nonlinear dynamical system is rarely studied. This paper presents a class of state-dependent impulsive dynamical systems with boundary constraints. We obtain the existence and continuation of their viable solutions and provide sufficient conditions for the existence and uniqueness of the viable solutions to the system. Finally, two examples are given to illustrate the effectiveness of the results.
The study evaluates the encryption method's resistance to well-known cryptographic assaults and assesses its robustness against frequent image processing operations. In this paper we evaluate of the blur-based picture encryption method and demonstrates how it is resistant to image processing operations and cryptographic assaults the benefits of the blur-based picture encryption method, highlighting its effectiveness and ease of use. It demonstrates the method's appropriateness for secure multimedia transmission and storage applications while identifying any flaws and outlining prospective improvements. A variety of techniques used in the study, including the Arnold Transform, logistic Map, Henon Map, Modified Arnold Transform, and Baker Map. Additionally, it emphasizes the Gaussian blur algorithm's performance in compared to other methods, highlighting how quickly it encrypts data only 0.0006 seconds. It also emphasizes the Gaussian blur algorithm's faster speed as compared to other algorithms.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.