A security model to protect the isolation of medical data in the cloud using hybrid cryptography
A cloud computing platform delivers a cost-efficient path for cloud users to store and access
data privately over remote storage via an Internet connection. Medical data is stored in the …
data privately over remote storage via an Internet connection. Medical data is stored in the …
[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices
Internet of Things (IoT) is a promising technology for creating smart environments, smart
systems, and smart services. Since security is a fundamental requirement of IoT platforms …
systems, and smart services. Since security is a fundamental requirement of IoT platforms …
An anonymous pre-authentication and post-authentication scheme assisted by cloud for medical IoT environments
R Vinoth, LJ Deborah, P Vijayakumar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) environment assisted by a cloud server is an emerging
conceptual model which incorporates the benefits of both IoT and cloud. In such an …
conceptual model which incorporates the benefits of both IoT and cloud. In such an …
Enhancing multi‐tenancy security in the cloud computing using hybrid ECC‐based data encryption approach
P Kumar, A Kumar Bhatt - IET Communications, 2020 - Wiley Online Library
In this study, elliptic curve cryptography (ECC) is elected for tenant authentication, data
encryption, and data decryption due to its minimum key size. The proposed ECC‐based …
encryption, and data decryption due to its minimum key size. The proposed ECC‐based …
Decentralized blockchain based authentication for secure data sharing in Cloud-IoT: DeBlock-Sec
U Narayanan, V Paul, S Joseph - Journal of Ambient Intelligence and …, 2022 - Springer
Abstract Cloud integrated Internet of Things (Cloud-IoT) has gained huge attention over this
decade. As millions of devices are connected over the internet, security becomes a more …
decade. As millions of devices are connected over the internet, security becomes a more …
Research perspectives on fully homomorphic encryption models for cloud sector
S Mittal, KR Ramkumar - Journal of Computer Security, 2021 - content.iospress.com
As there is a continuous delivery of big data, the researchers are showing interest in the
applications of cloud computing concerning privacy, and security. On the other hand, many …
applications of cloud computing concerning privacy, and security. On the other hand, many …
Lightweight secure session key protection, mutual authentication, and access control (LSSMAC) for WBAN-assisted IoT network
M Gupta, BS Kumar - IEEE Sensors Journal, 2023 - ieeexplore.ieee.org
Wireless body area network (WBAN) is a new technology trend that uses wearable sensors
linked to the Internet-of-Things (IoT) network to provide remote tracking and data collection …
linked to the Internet-of-Things (IoT) network to provide remote tracking and data collection …
Hybrid and Adaptive Cryptographic-based secure authentication approach in IoT based applications using hybrid encryption
Abstract The Internet of Things (IoT) in communication networks has gained major interest in
recent decades. Accordingly, secure authentication of such individuals results in a major …
recent decades. Accordingly, secure authentication of such individuals results in a major …
Exploring the fusion of lattice‐based quantum key distribution for secure Internet of Things communications
S Biswas, RS Goswami… - IET Quantum …, 2024 - Wiley Online Library
The integration of lattice‐based cryptography principles with Quantum Key Distribution
(QKD) protocols is explored to enhance security in the context of Internet of Things (IoT) …
(QKD) protocols is explored to enhance security in the context of Internet of Things (IoT) …
A matrix translation and elliptic curve based cryptosystem for secured data communications in WSNs
In this paper, we propose a new cryptosystem based on matrix translation and Elliptic curve
cryptography for developing a secure routing algorithm to provide energy efficient and …
cryptography for developing a secure routing algorithm to provide energy efficient and …