2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) 2018
DOI: 10.1109/iccic.2018.8782295
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Elliptic Curve Cryptographic Technique for Protecting Sensitive Attributes in Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…The key generation times also increase as the no of nodes increases simultaneously according to encryption/decryption performance with the messages transferred in bits shown in Figure 10. Table 4 compares the computational cost of signer, verifier, and ciphertext [42][43][44]. The different schemes use the various values for signature generation and verification depending on the message's length.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The key generation times also increase as the no of nodes increases simultaneously according to encryption/decryption performance with the messages transferred in bits shown in Figure 10. Table 4 compares the computational cost of signer, verifier, and ciphertext [42][43][44]. The different schemes use the various values for signature generation and verification depending on the message's length.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…However, this sensor network is vulnerable to various cyber-attacks due to its essential properties. The Sybil assault damaged the network, and it is the most harmful of the numerous cyber-attacks [42]. The Sybil attacks illustrate in three primary forms, which is shown in Figure 7.…”
Section: Sybil Attackmentioning
confidence: 99%
“…he does not give solution and among health care industry it gets shared.M.Sumathiet. al., [6] proposed the work of Enhanced Elliptic Curve Cryptographic (EECC) algorithm to generate accidental key with data owner private key and exact association admin key. Achieves better efficiency and security for both customer and administrator of organization.in this paper does not deal with public auditing system.…”
Section: Literature Surveymentioning
confidence: 99%
“…Elliptic Curve Cryptosystem is used for hierarchical access control which changes the secret key based on hierarchical relationship. The EECC method avoids many attacks such as offline dictionary attack, man in the middle attack and brute force attack [6].…”
Section: Introductionmentioning
confidence: 99%
“…A standard cloud computing architecture encompasses the subsequent techniques like ubiquitous computing, on-demand network, and pervasive computing [1]. Cloud computing virtualization technique specifies the sharing of resources by using three deployment models (private, public and hybrid cloud), four service models (Software as a service, Plat-form as a services, Infrastructure as a Service and Storage as a services) and five characteristics (elasticity, measured services, broad network access, resource pooling and on-demand self-service) [2]. Five characteristics of cloud computing, incorporated in BC technology, include measured service, on-demand self-service, rapid elasticity, resource pooling, and broad network access.…”
Section: Introductionmentioning
confidence: 99%