2018
DOI: 10.1007/978-981-13-1513-8_13
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Effective Encryption Algorithm for Securing Data in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…To overcome this difficulty, some network security concerns in the cloud environment are produced by critical features such as resource sharing, virtualization, flexibility, and other measurable services. Basel Saleh et al [117]. suggested an FIGURE 6: Classification of lightweight cryptography algorithms [116] approach for hyperdata encryption that combines symmetric ciphers, sharing a secret, and Diffie-Hellman key exchange techniques to improve security and overcome the concerns listed.…”
Section: E Lightweight Encryptionmentioning
confidence: 99%
“…To overcome this difficulty, some network security concerns in the cloud environment are produced by critical features such as resource sharing, virtualization, flexibility, and other measurable services. Basel Saleh et al [117]. suggested an FIGURE 6: Classification of lightweight cryptography algorithms [116] approach for hyperdata encryption that combines symmetric ciphers, sharing a secret, and Diffie-Hellman key exchange techniques to improve security and overcome the concerns listed.…”
Section: E Lightweight Encryptionmentioning
confidence: 99%
“…It is used to calculate the correlation relationship between the encrypted data and the data before encryption. It is also characterized by its ability to cover the characteristics of the image [23]. In this part.…”
Section:  Correlation Analysismentioning
confidence: 99%