2020
DOI: 10.1007/s40747-020-00162-3
|View full text |Cite
|
Sign up to set email alerts
|

A group-key-based sensitive attribute protection in cloud storage using modified random Fibonacci cryptography

Abstract: Cloud computing is an eminent technology for providing a data storage facility with efficient storage, maintenance, management and remote backups. Hence, user data are shifted from customary storage to cloud storage. In this transfer, the sensitive attributes are also shifted to cloud storage with high-end security. Current security techniques are processed with high encryption time and provide identical security of entire data with single key dependent. These processes are taking high computational time and l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(16 citation statements)
references
References 26 publications
0
16
0
Order By: Relevance
“…Full homomorphic encryption is widely used in privacy protection that entrusts a third party to participate in information processing while protecting the local plaintext, i.e., computing the ciphertexts before decrypting is equivalent to executing the same operation on the plaintext after decrypting [31]. CKKS is a full homomorphic encryption method that adds noise at the end of the truncated ciphertext.…”
Section: Full Homomorphic Encryptionmentioning
confidence: 99%
“…Full homomorphic encryption is widely used in privacy protection that entrusts a third party to participate in information processing while protecting the local plaintext, i.e., computing the ciphertexts before decrypting is equivalent to executing the same operation on the plaintext after decrypting [31]. CKKS is a full homomorphic encryption method that adds noise at the end of the truncated ciphertext.…”
Section: Full Homomorphic Encryptionmentioning
confidence: 99%
“…Efficient and robust encryption should have a high sensitivity to its secret key, meaning that even slight changes in the secret key should result in totally different cipher images. Moreover, with a slightly changed key, the method must be impossible to decrypt a cipher image or obtain some plain text patterns [34][35][36][37][38][39]. This is particularly useful for defending against brute force attacks.…”
Section: Key Sensitive Analysismentioning
confidence: 99%
“…Moreover, Brute force attacks on MD-5 hashes are fast, and MD-5 dictionary tables are big and have many collisions. 49 MD-5 algorithm was designed by Rivest 50 with three variants, that is, MD-2, 51 MD-4, 52 and MD5, all following almost the same structure. MD-2 is formulated basically for the 8 bit machines.…”
Section: Diffie-hellman Algorithmmentioning
confidence: 99%
“…The weakness of MD‐5 algorithm is that it does not provide security over collision attacks. Moreover, Brute force attacks on MD‐5 hashes are fast, and MD‐5 dictionary tables are big and have many collisions 49 …”
Section: Cryptographic Algorithmsmentioning
confidence: 99%