2023
DOI: 10.32604/cmc.2023.035695
|View full text |Cite
|
Sign up to set email alerts
|

Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality

Abstract: There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data, but these techniques and algorithms cannot be used to protect data from an attacker. Cloud cryptography is the best way to transmit data in a secure and reliable format. Various researchers have developed various mechanisms to transfer data securely, which can convert data from readable to unreadable, but these algorithms are not sufficient to provide complete data security. Each algorithm h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…In the paper [35], a variety of data security methods are presented. These solutions provide substantial protection against unauthorized access.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the paper [35], a variety of data security methods are presented. These solutions provide substantial protection against unauthorized access.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Several strategies are available for protecting cloud data from attackers, which, when utilized appropriately, can preserve data security. The researchers [23] created an effective solution by combining several ways to address this issue. First, the data were transformed into a decimal format using an ASCII table.…”
Section: Related Workmentioning
confidence: 99%