2017 International Conference on Networks &Amp; Advances in Computational Technologies (NetACT) 2017
DOI: 10.1109/netact.2017.8076755
|View full text |Cite
|
Sign up to set email alerts
|

A modified cryptographic approach for securing distributed data storage in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Input A is divided into two data packets, P and S, respectively, and they are encrypted. 28 First, it is used to create a random parameter P and utilized to generate new data packets through the A. The random key is placed by the user to enable the XOR operation of both P and S. The parameter of the key is placed on the user side, and it is stored in the special register.…”
Section: Encryptionmentioning
confidence: 99%
“…Input A is divided into two data packets, P and S, respectively, and they are encrypted. 28 First, it is used to create a random parameter P and utilized to generate new data packets through the A. The random key is placed by the user to enable the XOR operation of both P and S. The parameter of the key is placed on the user side, and it is stored in the special register.…”
Section: Encryptionmentioning
confidence: 99%
“…In [7] it is shown that SA-EDS have less encryption time as compared to AES on different data sets. It is proved in [33] that by brute force the keys can be extracted. In [34] it is proved that XOR is vulnerable to Pollution Attack.…”
Section: Literature Reviewmentioning
confidence: 99%