2017
DOI: 10.1109/access.2017.2744670
|View full text |Cite
|
Sign up to set email alerts
|

CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 50 publications
1
3
0
Order By: Relevance
“…ERSA encryption times also showed a proportional relationship between data size and encryption time [ 17 ]. This made their encryption times predictable, deterministic, and patterned which confirms the work of Masram et al [ 39 ] and [ 38 , 40 – 45 ]. The use of longer keys ensures higher security but results in higher CPU utilization when encryption time is dependent on data size (O (N)) [ 46 ].…”
Section: 0 Discussionsupporting
confidence: 82%
“…ERSA encryption times also showed a proportional relationship between data size and encryption time [ 17 ]. This made their encryption times predictable, deterministic, and patterned which confirms the work of Masram et al [ 39 ] and [ 38 , 40 – 45 ]. The use of longer keys ensures higher security but results in higher CPU utilization when encryption time is dependent on data size (O (N)) [ 46 ].…”
Section: 0 Discussionsupporting
confidence: 82%
“…The state of art technologies infers the ease of existing techniques for an instance. Banerjee et al [1], revolutionized the area of mobile cloud computing. He proposed a lightweight and computationally proficient protocol, called CLOAK, for the cell phone.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Initially, a random key is used to encrypt the first block and the subsequent key streams are generated by our cryptosystems based on the below function. The output of the above algorithm produces the key streams from the Jump graph of a web graph starts from 1, 1, 2, 3,4,5,6,1,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25, 26 by doing equivalence modulo 26.…”
Section: Establishment Of Key Streamsmentioning
confidence: 99%
“…Cloud services have been provided to companies in the past, but in recent years, services have been offered to individuals with the integration of Internet (IoT, Internet of Things) technology. However, as the purpose of using the cloud service is diversified, there is an increasing demand for the security of the data stored in the cloud environment 2 . Data stored in cloud computing is stored in the cloud server after encryption.…”
Section: Introductionmentioning
confidence: 99%