User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 17
 Downloands 2
CONGRUENCE COEFFICIENT EPHEMERAL NIEDERREITER CRYPTOGRAPHY FOR SECURED AND PRIVACY PRESERVED DATA TRANSMISSION IN CLOUD
2021
Journal:  
Turkish Journal of Computer and Mathematics Education
Author:  
Abstract:

Cloud computing is the process of utilizing the hardware and software to deliver various services over the network.Due to the huge development of big data that exists in the cloud servers, security and privacy are two fundamental factors about cloud technology. Cloud security is a vital concern for cloud storage services. Cloud data security is the process of protecting the data stored in the server from unauthorized access. Many researchers carried out their research on secured data communication in the cloud. But, the data confidentiality was not improved and encryption time was not minimized. A novel Congruence coefficient Ephemeral Niederreiter Cryptography-based Secured and Privacy Preserved Data Transmission (CCENC-SPPDT) technique is introduced for improving data confidentiality in a cloud environment. CCENCSPPDT technique comprises four processes, namely key generation, authentication, encryption, and decryption for improving the security and privacy during the patient data transmission in the cloud. In the CCENC-SPPDT technique, the cloud user (i.e., patient) registers detail to the cloud server (CS) (i.e., hospital) for performing the secured patient data communication. After registration, CS generates the ephemeral key pair (i.e., the ephemeral public key and ephemeral private key) in the key generation step for every registered cloud user. After receiving the ephemeral key pair, the cloud user encrypts the data with the ephemeral public key and transmits the encrypted patient data to the cloud server. When a cloud user needs to access the stored patient data from CS, the cloud user sends a request message to CS. After receiving the request, CS verifies the cloud user authenticity through the Congruence similarity coefficient with the dynamic session password. The authorized user allows accessing the data from the cloud server. Finally, patient data gets decrypted with the ephemeral private key of the cloud user. In this way, the patient data gets preserved from unauthorized access for improving the security level and data integrity by using the CCENC-SPPDT technique.Experimental evaluation is carried out onfactors such as encryption time, data confidentiality rate, and data integrity with respect to a number of patient data.

Keywords:

0
2021
Author:  
Citation Owners
Information: There is no ciation to this publication.
Similar Articles












Turkish Journal of Computer and Mathematics Education

Journal Type :   Uluslararası

Metrics
Article : 1.706
Cite : 102
2023 Impact : 0.071
Turkish Journal of Computer and Mathematics Education