Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (18)
  • Open Access


    Intelligent Digital Envelope for Distributed Cloud-Based Big Data Security

    S. Prince Chelladurai1,*, T. Rajagopalan2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 951-960, 2023, DOI:10.32604/csse.2023.034262

    Abstract Cloud computing offers numerous web-based services. The adoption of many Cloud applications has been hindered by concerns about data security and privacy. Cloud service providers’ access to private information raises more security issues. In addition, Cloud computing is incompatible with several industries, including finance and government. Public-key cryptography is frequently cited as a significant advancement in cryptography. In contrast, the Digital Envelope that will be used combines symmetric and asymmetric methods to secure sensitive data. This study aims to design a Digital Envelope for distributed Cloud-based large data security using public-key cryptography. Through strategic design, the hybrid Envelope model adequately… More >

  • Open Access


    Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment

    P. Prathap Nayudu, Krovi Raja Sekhar*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1079-1092, 2023, DOI:10.32604/csse.2023.033961

    Abstract The cloud allows clients to store and share data. Depending on the user’s needs, it is imperative to design an effective access control plan to share the information only with approved users. The user loses control of their data when the data is outsourced to the cloud. Therefore, access control mechanisms will become a significant challenging problem. The Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an essential solution in which the user can control data access. CP-ABE encrypts the data under a limited access policy after the user sets some access policies. The user can decrypt the data if they satisfy the… More >

  • Open Access


    Enhanced Rsa (Ersa): An Advanced Mechanism for Improving the Security

    S. Castro1,*, R. PushpaLakshmi2

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2267-2279, 2023, DOI:10.32604/iasc.2023.032222

    Abstract Cloud computing has become ubiquitous in our daily lives in recent years. Data are the source of technology that is generated hugely by various sources. Big data is dealing with huge data volumes or complex data. The major concern in big data is security threats. Security concerns create a negative impact on the user on the aspect of trust. In big data still, security threats exist as commonly known as DDOS (Distributed-Denial-of-Service) attacks, data loss, Inadequate Data Backups, System Vulnerabilities, and Phishing as well as Social Engineering Attacks. In our work, we have taken the data loss and Inadequate Data… More >

  • Open Access


    DERNNet: Dual Encoding Recurrent Neural Network Based Secure Optimal Routing in WSN

    A. Venkatesh1, S. Asha2,*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1375-1392, 2023, DOI:10.32604/csse.2023.030944

    Abstract A Wireless Sensor Network (WSN) is constructed with numerous sensors over geographical regions. The basic challenge experienced while designing WSN is in increasing the network lifetime and use of low energy. As sensor nodes are resource constrained in nature, novel techniques are essential to improve lifetime of nodes in WSN. Nodes energy is considered as an important resource for sensor node which are battery powered based. In WSN, energy is consumed mainly while data is being transferred among nodes in the network. Several research works are carried out focusing on preserving energy of nodes in the network and made network… More >

  • Open Access


    An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms

    Muhammad Nadeem1, Ali Arshad2,*, Saman Riaz2, Syeda Wajiha Zahra1, Ashit Kumar Dutta3, Moteeb Al Moteri4, Sultan Almotairi5

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4059-4079, 2023, DOI:10.32604/cmc.2023.032882

    Abstract Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form. Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data. This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse. If this algorithm is applied to the cloud network, the attacker will not be able to access the data. To encrypt the data, the values of the bytes have been obtained by converting the plain text to ASCII. A key has been… More >

  • Open Access


    Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks

    Muhammad Nadeem1, Ali Arshad2, Saman Riaz2, Syeda Wajiha Zahra1, Shahab S. Band3, Amir Mosavi4,5,6,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2625-2640, 2023, DOI:10.32604/cmc.2023.030899

    Abstract Many organizations have insisted on protecting the cloud server from the outside, although the risks of attacking the cloud server are mostly from the inside. There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks. Still, the attackers have designed even better mechanisms to break these security algorithms. Cloud cryptography is the best data protection algorithm that exchanges data between authentic users. In this article, one symmetric cryptography algorithm will be designed to secure cloud server data, used to send and receive cloud server data securely. A double… More >

  • Open Access


    Smart Quarantine Environment Privacy through IoT Gadgets Using Blockchain

    Nitish Pathak1, Shams Tabrez Siddiqui2, Anjani Kumar Singha3, Heba G Mohamed4, Shabana Urooj4,*, Abhinandan R Patil5

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3021-3036, 2023, DOI:10.32604/iasc.2023.029053

    Abstract The coronavirus, formerly known as COVID-19, has caused massive global disasters. As a precaution, most governments imposed quarantine periods ranging from months to years and postponed significant financial obligations. Furthermore, governments around the world have used cutting-edge technologies to track citizens’ activity. Thousands of sensors were connected to IoT (Internet of Things) devices to monitor the catastrophic eruption with billions of connected devices that use these novel tools and apps, privacy and security issues regarding data transmission and memory space abound. In this study, we suggest a blockchain-based methodology for safeguarding data in the billions of devices and sensors connected… More >

  • Open Access


    VLSI Implementation of Optimized 2D SIMM Chaotic Map for Image Encryption

    M. Sundar Prakash Balaji1,*, V. R. Vijaykumar2, Kamalraj Subramaniam3, M. Kannan4, V. Ayyem Pillai5

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3155-3168, 2023, DOI:10.32604/iasc.2023.028969

    Abstract The current research work proposed a novel optimization-based 2D-SIMM (Two-Dimensional Sine Iterative chaotic map with infinite collapse Modulation Map) model for image encryption. The proposed 2D-SIMM model is derived out of sine map and Iterative Chaotic Map with Infinite Collapse (ICMIC). In this technique, scrambling effect is achieved with the help of Chaotic Shift Transform (CST). Chaotic Shift Transform is used to change the value of pixels in the input image while the substituted value is cyclically shifted according to the chaotic sequence generated by 2D-SIMM model. These chaotic sequences, generated using 2D-SIMM model, are sensitive to initial conditions. In… More >

  • Open Access


    Multivariate Broadcast Encryption with Group Key Algorithm for Secured IoT

    M. Suresh Kumar1,*, T. Purosothaman2

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 925-938, 2023, DOI:10.32604/csse.2023.027315

    Abstract The expanding and ubiquitous availability of the Internet of Things (IoT) have changed everyone’s life easier and more convenient. Same time it also offers a number of issues, such as effectiveness, security, and excessive power consumption, which constitute a danger to intelligent IoT-based apps. Group managing is primarily used for transmitting and multi-pathing communications that are secured with a general group key and it can only be decrypted by an authorized group member. A centralized trustworthy system, which is in charge of key distribution and upgrades, is used to maintain group keys. To provide longitudinal access controls, Software Defined Network… More >

  • Open Access


    Paillier Cryptography Based Message Authentication Code for IoMT Security

    S. Siamala Devi1, Chandrakala Kuruba2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2209-2223, 2023, DOI:10.32604/csse.2023.025514

    Abstract Health care visualization through Internet of Things (IoT) over wireless sensor network (WSN) becomes a current research attention due to medical sensor evolution of devices. The digital technology-based communication system is widely used in all application. Internet of medical thing (IoMT) assisted healthcare application ensures the continuous health monitoring of a patient and provides the early awareness of the one who is suffered without human participation. These smart medical devices may consume with limited resources and also the data generated by these devices are large in size. These IoMT based applications suffer from the issues such as security, anonymity, privacy,… More >

Displaying 1-10 on page 1 of 18. Per Page