2020
DOI: 10.32604/cmes.2020.09361
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Non-Commutative Encryption Approach with Optimized Genetic Algorithm for Ensuring Data Protection in Cloud Computing

Abstract: Nowadays, succeeding safe communication and protection-sensitive data from unauthorized access above public networks are the main worries in cloud servers. Hence, to secure both data and keys ensuring secured data storage and access, our proposed work designs a Novel Quantum Key Distribution (QKD) relying upon a non-commutative encryption framework. It makes use of a Novel Quantum Key Distribution approach, which guarantees high level secured data transmission. Along with this, a shared secret is generated usi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…Digital forensics is a collection of procedures developed by scientific specialists to acquire traces from a crime scene, analyze them, and present the evidence discovered to aid in identifying the malicious actors, their motivation, and the method employed 7 . Digital forensics has been divided into specialties in recent years as a result of technical developments, such as network forensics, cloud forensics, mobile forensics, IoT forensics, data forensics, and memory forensics 8–15 …”
Section: Introductionmentioning
confidence: 99%
“…Digital forensics is a collection of procedures developed by scientific specialists to acquire traces from a crime scene, analyze them, and present the evidence discovered to aid in identifying the malicious actors, their motivation, and the method employed 7 . Digital forensics has been divided into specialties in recent years as a result of technical developments, such as network forensics, cloud forensics, mobile forensics, IoT forensics, data forensics, and memory forensics 8–15 …”
Section: Introductionmentioning
confidence: 99%
“…In some healthcare applications, disease prediction or diagnosis is unable to provide real‐time deployment 5–20 . This work evolves into the healthcare domain, and cloud computing is almost always the most cost‐effective option for clients' healthcare businesses because it is often less expensive than having multiple computers in different medical rooms, each of which requires proper hardware, updated software, and network access to upload, store, and retrieve patient or other medical data.…”
Section: Introductionmentioning
confidence: 99%
“…In addition to this, few security problems that arise because of virtualization and multitenancies are communication, isolation, as well as resource management system. Practically, it becomes a troublesome task for the user to go through similar words for all keys that further results in inaccurate search results 10‐26 . Currently, the cloud computing faces numerous challenges based on multitenancy, scalability and interoperability.…”
Section: Introductionmentioning
confidence: 99%