2021
DOI: 10.14445/22315381/ijett-v69i10p201
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography based Techniques of Encryption for Security of Data in Cloud Computing Paradigm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 19 publications
0
0
0
Order By: Relevance
“…• We build a stacked SVM-based deep learning framework for an association rule method using the cryptographic blocks given. • We demonstrate that our approach can provide a better level of privacy than most recent research (12,21,22) . Furthermore, we comprehensively demonstrate the security of our approach using multiple datasets.…”
Section: Our Contributionsmentioning
confidence: 79%
See 2 more Smart Citations
“…• We build a stacked SVM-based deep learning framework for an association rule method using the cryptographic blocks given. • We demonstrate that our approach can provide a better level of privacy than most recent research (12,21,22) . Furthermore, we comprehensively demonstrate the security of our approach using multiple datasets.…”
Section: Our Contributionsmentioning
confidence: 79%
“…In this encryption section, the Elgamal encryption method is used with 2160 and 1024-bits modulus form. For privacy comparison (21) and (22) papers encryption method is used. Our proposed method is having high level security when compared with double crypto encryption (21) and some other non-privacy methods (22) .…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…A ciphertext attack is when an attacker obtains information about encrypted ciphertext and attempts to deduce the secret key used for encryption and decryption. Maria Imdad et al (2020) and Wei Feng et al (2018) addressed this attack using DNA security schemes, demonstrating its durability and energy-efficient storage capabilities successfully 51 .…”
Section: Dna Security and Different Kinds Of Attacksmentioning
confidence: 99%
“…In a chosen plaintext attack, the attacker can select plaintext and observe its corresponding ciphertext. 2018) addressed this attack using DNA security schemes, demonstrating its durability and energy-efficient storage capabilities successfully 51 .…”
Section: Plain Text Attack (Pta)mentioning
confidence: 99%