2020
DOI: 10.1049/iet-com.2020.0255
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing multi‐tenancy security in the cloud computing using hybrid ECC‐based data encryption approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…According to Gartner's 2012 survey report, more than 60% of enterprise CTOs believe that the main reason for not adopting cloud computing technology in the short term is that big data faces problems in security and privacy protection. From simple data to trade secrets to intellectual property rights, the disclosure of big data may lead to reputation damage, economic losses, and even legal sanctions [20].…”
Section: Literature Reviewmentioning
confidence: 99%
“…According to Gartner's 2012 survey report, more than 60% of enterprise CTOs believe that the main reason for not adopting cloud computing technology in the short term is that big data faces problems in security and privacy protection. From simple data to trade secrets to intellectual property rights, the disclosure of big data may lead to reputation damage, economic losses, and even legal sanctions [20].…”
Section: Literature Reviewmentioning
confidence: 99%
“…erefore, it is necessary to preprocess the media corpus data. In the obtained media corpus data, the characteristics of media corpus data cannot become the key data due to the rapid change of media corpus data [10].…”
Section: Media Corpus Data Preprocessingmentioning
confidence: 99%
“…In the multi-tenant mode, it establishes a private virtual account for each tenant to guarantee their data security and personal privacy. In addition, literature [40] proposes a hybrid encryption algorithm by combining encryption algorithm with evolutionary computation. Moth Swarm Algorithm (MSA), is used to find the optimal elliptic curve value and calculate the optimal cipher of the elliptic curve encryption algorithm ECC, aiming to improve the calculation efficiency and security performance of ECC.…”
Section: Different Loadsmentioning
confidence: 99%