2018 International Conference on Communication and Signal Processing (ICCSP) 2018
DOI: 10.1109/iccsp.2018.8524212
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Cloud Security Implementation Using Modified ECC Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 11 publications
1
6
0
Order By: Relevance
“…Time complexity refers to the time it takes for an algorithm to encipher a plaintext into a Ciphertext and decipher a Ciphertext into a plaintext. When the scrambling time is faster, this implies the data processing time is faster and such algorithms are considered to be efficient [ 38 ]. There have been a series of research to propose algorithms with the lowest execution time with a nonlinear time complexity O ( n ) [ 39 ].…”
Section: Implementation Results and Discussionmentioning
confidence: 99%
“…Time complexity refers to the time it takes for an algorithm to encipher a plaintext into a Ciphertext and decipher a Ciphertext into a plaintext. When the scrambling time is faster, this implies the data processing time is faster and such algorithms are considered to be efficient [ 38 ]. There have been a series of research to propose algorithms with the lowest execution time with a nonlinear time complexity O ( n ) [ 39 ].…”
Section: Implementation Results and Discussionmentioning
confidence: 99%
“…EMR comprises of elementary information and medical history of the patients, clinical and doctor data, insurance information, etc. It also the readings and records generated through the internal and external sources like biometric data, genetics, blood pressure, electronic medical records, remote sensors data and social media data [1,2,3]. The application of cloud computing technology in healthcare sector can be proved useful in preventing epidemics, improving the quality of life, effectiveness of Clinical Trials, Detecting Side Effects of Drugs, etc.…”
Section: Access Controlmentioning
confidence: 99%
“…M. Thangapandiyan et al In [1] proposed modifies elliptic curve cryptography algorithm to offers privacy to sensitive data. Separate keys are generated here for admin and user and the modified ECC uses for both encoding and decoding.…”
Section: Literature Surveymentioning
confidence: 99%