2020
DOI: 10.3233/jifs-191687
|View full text |Cite
|
Sign up to set email alerts
|

K-RSA: Secure data storage technique for multimedia in cloud data server

Abstract: Cloud has become one of the most demanding services for data storage. On another hand, the security of data is one of the challenging tasks for Cloud Service Provider (CSP). Cryptography is one of the ways for securing the storage data. Cryptography is not a new approach instead of the efficient utilization of cryptographical algorithms is greatly needed. In this work, we proposed a Secure Hidden Layer (SHL) and Application Programming Interface (API) for data encryption. The SHL is consisting of two major mod… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…3 presents the evaluation of the cryptographic algorithm based on encryption time. Here, the proposed C-RSA technique value is acceptable and matches Blowfish, AES, DES, DNA, and BDNA [34], and is comparable with the K-RSA [12].…”
Section: Text File Encryptionmentioning
confidence: 66%
See 2 more Smart Citations
“…3 presents the evaluation of the cryptographic algorithm based on encryption time. Here, the proposed C-RSA technique value is acceptable and matches Blowfish, AES, DES, DNA, and BDNA [34], and is comparable with the K-RSA [12].…”
Section: Text File Encryptionmentioning
confidence: 66%
“…Here the results of the C-RSA technique have been compared with the various traditional encryption algorithms. It is observed that the results of the proposed techniques are better than the methods (Blowfish, AES, DES, DNA, and BDNA) and very close to the K-RSA [34,12]. It shows that the proposed technique requires less space for storing encrypted text files.…”
Section: Text File Encryptionmentioning
confidence: 79%
See 1 more Smart Citation
“…Due to the large number and types of energy big data, in order to improve data storage efficiency, we first conduct statistical analysis on energy big data [6]. Suppose the original sequence of the energy big data center is…”
Section: Statistical Analysis Of Energy Big Datamentioning
confidence: 99%
“…A consistent view about both data security concerns and privacy issues presented in the survey that are faced by clients in cloud storage environments has been carried out [18]. Further to study the security in a cloud network, Secure Hidden Layer (SHL) and Application Programming Interface (API) for data encryption explained in [19]. The SHL is consisting of two major modules (i) Key Management Server (KMS) and (ii) Share Holder Server (SHS) which is used for storing and sharing cryptographic keys.…”
Section: Literature Surveymentioning
confidence: 99%