A security model to protect the isolation of medical data in the cloud using hybrid cryptography

S Gadde, J Amutharaj, S Usha - Journal of Information Security and …, 2023 - Elsevier
A cloud computing platform delivers a cost-efficient path for cloud users to store and access
data privately over remote storage via an Internet connection. Medical data is stored in the …

[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices

Z AlJabri, J Abawajy, S Huda - Wireless Communications and …, 2023 - Wiley Online Library
Internet of Things (IoT) is a promising technology for creating smart environments, smart
systems, and smart services. Since security is a fundamental requirement of IoT platforms …

An anonymous pre-authentication and post-authentication scheme assisted by cloud for medical IoT environments

R Vinoth, LJ Deborah, P Vijayakumar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) environment assisted by a cloud server is an emerging
conceptual model which incorporates the benefits of both IoT and cloud. In such an …

Enhancing multi‐tenancy security in the cloud computing using hybrid ECC‐based data encryption approach

P Kumar, A Kumar Bhatt - IET Communications, 2020 - Wiley Online Library
In this study, elliptic curve cryptography (ECC) is elected for tenant authentication, data
encryption, and data decryption due to its minimum key size. The proposed ECC‐based …

Decentralized blockchain based authentication for secure data sharing in Cloud-IoT: DeBlock-Sec

U Narayanan, V Paul, S Joseph - Journal of Ambient Intelligence and …, 2022 - Springer
Abstract Cloud integrated Internet of Things (Cloud-IoT) has gained huge attention over this
decade. As millions of devices are connected over the internet, security becomes a more …

Research perspectives on fully homomorphic encryption models for cloud sector

S Mittal, KR Ramkumar - Journal of Computer Security, 2021 - content.iospress.com
As there is a continuous delivery of big data, the researchers are showing interest in the
applications of cloud computing concerning privacy, and security. On the other hand, many …

Lightweight secure session key protection, mutual authentication, and access control (LSSMAC) for WBAN-assisted IoT network

M Gupta, BS Kumar - IEEE Sensors Journal, 2023 - ieeexplore.ieee.org
Wireless body area network (WBAN) is a new technology trend that uses wearable sensors
linked to the Internet-of-Things (IoT) network to provide remote tracking and data collection …

Hybrid and Adaptive Cryptographic-based secure authentication approach in IoT based applications using hybrid encryption

KS Patil, I Mandal, C Rangaswamy - Pervasive and Mobile Computing, 2022 - Elsevier
Abstract The Internet of Things (IoT) in communication networks has gained major interest in
recent decades. Accordingly, secure authentication of such individuals results in a major …

Exploring the fusion of lattice‐based quantum key distribution for secure Internet of Things communications

S Biswas, RS Goswami… - IET Quantum …, 2024 - Wiley Online Library
The integration of lattice‐based cryptography principles with Quantum Key Distribution
(QKD) protocols is explored to enhance security in the context of Internet of Things (IoT) …

A matrix translation and elliptic curve based cryptosystem for secured data communications in WSNs

S Pradeep, S Muthurajkumar, S Ganapathy… - Wireless Personal …, 2021 - Springer
In this paper, we propose a new cryptosystem based on matrix translation and Elliptic curve
cryptography for developing a secure routing algorithm to provide energy efficient and …