Kullanım Kılavuzu
Neden sadece 3 sonuç görüntüleyebiliyorum?
Sadece üye olan kurumların ağından bağlandığınız da tüm sonuçları görüntüleyebilirsiniz. Üye olmayan kurumlar için kurum yetkililerinin başvurması durumunda 1 aylık ücretsiz deneme sürümü açmaktayız.
Benim olmayan çok sonuç geliyor?
Birçok kaynakça da atıflar "Soyad, İ" olarak gösterildiği için özellikle Soyad ve isminin baş harfi aynı olan akademisyenlerin atıfları zaman zaman karışabilmektedir. Bu sorun tüm dünyadaki atıf dizinlerinin sıkça karşılaştığı bir sorundur.
Sadece ilgili makaleme yapılan atıfları nasıl görebilirim?
Makalenizin ismini arattıktan sonra detaylar kısmına bastığınız anda seçtiğiniz makaleye yapılan atıfları görebilirsiniz.
 Görüntüleme 15
 İndirme 2
Congruence Coefficient Ephemeral Niederreiter Cryptography For Secured and Privacy Preserved Data Transmission In Cloud
2021
Dergi:  
Turkish Journal of Computer and Mathematics Education
Yazar:  
Özet:

Cloud computing is the process of utilizing the hardware and software to deliver various services over the network.Due to the huge development of big data that exists in the cloud servers, security and privacy are two fundamental factors about cloud technology. Cloud security is a vital concern for cloud storage services. Cloud data security is the process of protecting the data stored in the server from unauthorized access. Many researchers carried out their research on secured data communication in the cloud. But, the data confidentiality was not improved and encryption time was not minimized. A novel Congruence coefficient Ephemeral Niederreiter Cryptography-based Secured and Privacy Preserved Data Transmission (CCENC-SPPDT) technique is introduced for improving data confidentiality in a cloud environment. CCENCSPPDT technique comprises four processes, namely key generation, authentication, encryption, and decryption for improving the security and privacy during the patient data transmission in the cloud. In the CCENC-SPPDT technique, the cloud user (i.e., patient) registers detail to the cloud server (CS) (i.e., hospital) for performing the secured patient data communication. After registration, CS generates the ephemeral key pair (i.e., the ephemeral public key and ephemeral private key) in the key generation step for every registered cloud user. After receiving the ephemeral key pair, the cloud user encrypts the data with the ephemeral public key and transmits the encrypted patient data to the cloud server. When a cloud user needs to access the stored patient data from CS, the cloud user sends a request message to CS. After receiving the request, CS verifies the cloud user authenticity through the Congruence similarity coefficient with the dynamic session password. The authorized user allows accessing the data from the cloud server. Finally, patient data gets decrypted with the ephemeral private key of the cloud user. In this way, the patient data gets preserved from unauthorized access for improving the security level and data integrity by using the CCENC-SPPDT technique.Experimental evaluation is carried out onfactors such as encryption time, data confidentiality rate, and data integrity with respect to a number of patient data.

Anahtar Kelimeler:

0
2021
Yazar:  
Atıf Yapanlar
Bilgi: Bu yayına herhangi bir atıf yapılmamıştır.
Benzer Makaleler












Turkish Journal of Computer and Mathematics Education

Dergi Türü :   Uluslararası

Metrikler
Makale : 1.706
Atıf : 97
2023 Impact/Etki : 0.071
Turkish Journal of Computer and Mathematics Education