2021
DOI: 10.18280/ijsse.110208
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Solution for Security Problem in Cloud Computing Storage During Global Pandemics

Abstract: Cloud computing has emerged as a potential substitute over traditional computing systems during the time of the COVID-19 pandemic. Almost all organizations shift their working from conventional ways to the online form of working. Most of the organizations are planning to permanently change some % of their work to online WFH (Work from Home) mode. There are numerous benefits of using cloud services in terms of cost, portability, platform independence, accessibility, elasticity, etc. But security is the biggest … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…(1) Although industrial firewalls are usually located between corporate office networks and industrial information management systems, violators can penetrate through firewalls by means of bouncing, mediation, spoofing, and eventually accessing industrial information management systems [15] (2) Wireless transmission technology is usually widely used to access industrial information control systems in wireless communication networks, with the central control node acting as a repeater to provide remote communication between multiple device nodes. The openness of wireless network access also contributes to the increase in intrusion and information theft [16] (3) Some industrial control equipment manufacturers require remote connections to install, maintain, and update equipment.…”
Section: Forms Of Information Security Intrusionmentioning
confidence: 99%
“…(1) Although industrial firewalls are usually located between corporate office networks and industrial information management systems, violators can penetrate through firewalls by means of bouncing, mediation, spoofing, and eventually accessing industrial information management systems [15] (2) Wireless transmission technology is usually widely used to access industrial information control systems in wireless communication networks, with the central control node acting as a repeater to provide remote communication between multiple device nodes. The openness of wireless network access also contributes to the increase in intrusion and information theft [16] (3) Some industrial control equipment manufacturers require remote connections to install, maintain, and update equipment.…”
Section: Forms Of Information Security Intrusionmentioning
confidence: 99%
“…Data security and reliability are also enhanced with cloud computing. Cloud service providers typically offer robust security measures, including data encryption and regular backups, to protect against data loss and cyber threats (Yadav, Ritika and Garg, 2021). This level of security is often more advanced than what a company could afford to implement on its own.…”
Section: Cloud Computing As a Solutionmentioning
confidence: 99%
“…𝑏 𝑝 } ∈ (0,1) . The proposed S-box generates 16 distinct output values: [7,11,10,5,3,4,0,8,12,2,14,6,13,1,9,15]. Here Bijectivity criteria are fulfilled as each value has appeared once only.…”
Section: ) Bijectivitymentioning
confidence: 99%
“…The intricate spatial arrangement and the substantial data contained within a 3-D model file underscore the need for suitable encryption methods [5]. Traditional block ciphers such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), despite their utility in various applications, fail to meet the requirements for securing complex 3-D model files within resource-constrained IoT environments, spotlighting the importance of security considerations for cloud storage and portable clients [6,7]. Given these challenges, attention is redirected towards advancements in 3-D printer technology and the opportunities they present.…”
Section: Introductionmentioning
confidence: 99%