2022
DOI: 10.3390/app12168143
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Architecture to Protect the Network from Replay Attacks during Client-to-Client Data Transmission

Abstract: Cloud computing is an online data storage system that can be easily accessed anywhere. Various algorithms and techniques have been developed to secure cloud data, which, if used correctly, can detect cloud attacks. These algorithms can only detect cloud data attacks and cannot prevent such attacks. If an attacker gains access to the data, he or she can tamper with the data in any way that could lead to misuse of the data. This paper will design a secure architecture for securing data with various algorithm imp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Multiple algorithms and methods [32] have been devised to protect cloud data against replay attacks. However, it is essential to note that cloud data are still vulnerable to such assaults.…”
Section: Related Workmentioning
confidence: 99%
“…Multiple algorithms and methods [32] have been devised to protect cloud data against replay attacks. However, it is essential to note that cloud data are still vulnerable to such assaults.…”
Section: Related Workmentioning
confidence: 99%
“…The system reduces the complexity and running time but it failed to consider the big data applications. An efficient cryptosystem was introduced in reference 4 for protecting the data from replay attacks. Security was improved.…”
Section: Introductionmentioning
confidence: 99%
“…Accurate identification of attack types is crucial to system security. At present, denial of service attacks (DOSA), 9‐11 replay attacks, 12‐14 eavesdropping attacks, 15‐17 and FDIA (false data injection attacks) 18‐20 are the main types of common network attacks. DOSA is a depleting attack on the resources of the attacked object, which interrupts the normal communication of the system.…”
Section: Introductionmentioning
confidence: 99%