2022
DOI: 10.56578/jisc010107
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Reconfigurable Cryptographic Model for Dynamic and Secure Unstructured Data Sharing in Multi-Cloud Storage Server

Abstract: This study designs a reconfigurable multi-cloud storage server architecture for dynamic and secure data sharing has been designed, improves the security of unstructured data using cryptographic index-based data slicing (CIBDS), and reduces the malicious insider through data encryption using a third data encryption algorithm (3DEA). Focusing on multi-cloud storage server (MCSS) and data life cycle which includes three stages (i.e., data input, transition and utilization), the authors determined the efficiency o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 44 publications
(46 reference statements)
0
7
0
Order By: Relevance
“…Table 4 and Figure 4 show the results of end-to-end delay obtained for all the protocols for the real-time traffic scenario [53,54].…”
Section: Results For Real-time Trafficmentioning
confidence: 99%
See 1 more Smart Citation
“…Table 4 and Figure 4 show the results of end-to-end delay obtained for all the protocols for the real-time traffic scenario [53,54].…”
Section: Results For Real-time Trafficmentioning
confidence: 99%
“…The routing protocols investigated included AODV, TORA, OLSR, and GRP, while different queuing choices such as FIFO, PQ, and WFQ were also analyzed [9,10]. Their results showed that Jitter delay, packet delay in transit, and wireless LAN media access response time and throughput of 802.11 g technology at 54 Mbps are important factors that affect the quality of VoIP conversations. Khan et al [11] proposed a smart routing method to connect an IoT service and its real-world data flow, aimed at improving the routing protocol in the context of the Internet of Things (IoT).…”
Section: Introductionmentioning
confidence: 99%
“…The results are estimated and tabulated in Tables 1, 2 and 3 respectively. Figure 8 shows the various methods of end-to-end delay in WSN with respect to the vehicle (node) velocity of 40Km/h [42][43][44][45][46]. Figure 9 shows the comparison analysis of various techniques of PDR with respect to the vehicle velocity 40Km/h and Figure 10 shows the throughput analysis of various techniques with respect to the number of nodes.…”
Section: Geographic Routing Protocol (Grp) -Analysis and Discussionmentioning
confidence: 99%
“…In the Proof-of-Work (PoW) algorithm, validating a block requires solving a mathematical puzzle. The time it takes to validate new blocks and the computing power of the miner nodes both affect how challenging the puzzle needs to be [24][25][26][27].…”
Section: Background Of Bcmentioning
confidence: 99%