2022
DOI: 10.1186/s13677-022-00336-z
|View full text |Cite
|
Sign up to set email alerts
|

An enhanced encryption-based security framework in the CPS Cloud

Abstract: The rapid advancement of computation techniques and cloud computing has led to substantial advancements in Cyber-Physical Systems (CPS), particularly in the field of health care. There are a variety of ways in which CPS is used in healthcare today, including delivering intelligent feedback systems, automatically updating patient data digitally, monitoring patients passively with biosensors, etc. In recent years, cyber-physical systems have become capable of making lifesaving decisions as they are becoming more… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 33 publications
0
9
0
Order By: Relevance
“…We made use of the percentage to assess the suggested model's efficacy. In the provided hyper-parameter setup, the model offers accuracy and precision.Cross Breed Blowfish and MD5 (CBM-MD5) (18), Fully Homomorphic encryption algorithm (FHEA) (19), and Improved Chacha20 Algorithm (ICC) (20), can achieve ideal performance.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We made use of the percentage to assess the suggested model's efficacy. In the provided hyper-parameter setup, the model offers accuracy and precision.Cross Breed Blowfish and MD5 (CBM-MD5) (18), Fully Homomorphic encryption algorithm (FHEA) (19), and Improved Chacha20 Algorithm (ICC) (20), can achieve ideal performance.…”
Section: Resultsmentioning
confidence: 99%
“…The CBM-MD5 maintaining a customized hybrid cryptography system is harder when flaws are found and cryptographic standards change. It could be necessary to make regular upgrades and changes to handle new threats and vulnerabilities [18]. The possibility offering a single symbol error could alter an entire block makes ICC likewise prone to errors [19].…”
Section: Discussionmentioning
confidence: 99%
“…It transforms information into a secure code and guards against unauthorized access. This technique is fundamental to digital security and ensures that the private data remains confidential and accessible only through a specific key 50,51 . Parallel to this, various cultures and traditions have their own methods of protection.…”
Section: Encryption and Ta'weez (Amulets)mentioning
confidence: 99%
“…Therefore, in future study, we will further consider the privacy disclosure issue in our proposed algorithm by introducing more effective privacy protection techniques including blockchain, federated learning, DP, encryption, etc. [ 50 52 ]. In addition, energy saving and cost optimization are also key challenges in typical big data applications [ 53 , 54 ].…”
Section: Conslusionsmentioning
confidence: 99%