A hybrid framework to enhance cloud security for storing and retrieving confidential data in clouds
Abstract
Keywords
Full Text:
PDFReferences
1. Gbashi EK. Proposed secret encoding method based genetic algorithm for elliptic curve cryptography method. Iraqi Journal of Information Technology 2018; 8(3): 21–46.
2. Reyad O. Text message encoding based on elliptic curve cryptography and a mapping methodology. Information Sciences Letters 2018; 7(1): 7–11.
3. Keerthi K, Surendiran B. Elliptic curve cryptography for secured text encryption. In: Proceedings of 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT); 20–21 April 2017; Kollam, India. pp. 1–5.
4. Younes L, Youssef A, Saiida L. Definition and implementation of an elliptic curve cryptosystem using a new message mapping scheme. In: Proceedings of the 3rd International Conference on Networking, Information Systems & Security; 23–25 March 2020; Athens, Greece. pp. 1–6.
5. Almajed HN, Almogren AS. SE-Enc: A secure and efficient encoding scheme using elliptic curve cryptography. IEEE Access 2019; 7: 175865–175878. doi: 10.1109/ACCESS.2019.2957943
6. Mahto D, Yadav DK. Performance analysis of RSA and elliptic curve cryptography. International Journal of Network Security 2018; 20(4): 625–635. doi: 10.6633/IJNS.201807 20(4).04)
7. Dhanda SS, Singh B, Jindal P. Demystifying elliptic curve cryptography: Curve selection, implementation and countermeasures to attacks. Journal of Interdisciplinary Mathematics 2020; 23(2): 463–470. doi: 10.1080/09720502.2020.1731959
8. Alimoradi R, Arkian HR, Razavian SMJ, Ramzi A. Scalar multiplication in elliptic curve libraries. Journal of Discrete Mathematical Sciences and Cryptography 2021; 24(3): 657–666. doi: 10.1080/09720529.2017.1378411
9. Gayoso Martinez V, Hernández Encinas L, Martín Muñoz A, Durán Díaz R. Secure elliptic curves and their performance. Logic Journal of the IGPL 2019; 27(2): 277–238. doi: 10.1093/jigpal/jzy035
10. Errahmani HB, Ikni H. Verifiable self-selecting secret sharing based on elliptic curves. International Journal of Software Innovation (IJSI) 2020; 8(3): 51–68. doi: 10.4018/IJSI.2020070104
11. Naji MA, Hammood DA, Atee HA, et al. Cryptanalysis cipher text using new modeling: Text encryption using elliptic curve cryptography. AIP Conference Proceedings 2020; 2203(1): 020003. doi: 10.1063/1.5142095
12. Roy S, Khatwani C. Cryptanalysis and improvement of ECC based authentication and key exchanging protocols. Cryptography 2017; 1(1): 9. doi: 10.3390/cryptography1010009
13. Ding S, Li C, Li H. A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. IEEE Access 2018; 6: 27336–27345. doi: 10.1109/ACCESS.2018.2836350
14. Belguith S, Kaaniche N, Laurent M, et al. PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Computer Networks 2018; 133: 141–156. doi: 10.1016/j.comnet.2018.01.036
15. Xue Y, Xue K, Gai N, et al. An attribute-based controlled collaborative access control scheme for public cloud storage. IEEE Transactions on Information Forensics and Security 2019; 14(11): 2927–2942. doi: 10.1109/TIFS.2019.2911166
16. Sowjanya K, Dasgupta M, Ray S, Obaidat MS. An efficient elliptic curve cryptography-based without pairing KPABE for Internet of Things. IEEE Systems Journal 2019; 14(2): 2154–2163. doi: 10.1109/JSYST.2019.2944240
17. Lu Y, Li J. Constructing pairing-free certificateless public key encryption with keyword search. Frontiers of Information Technology & Electronic Engineering 2019; 20(8): 1049–1060. doi: 10.1631/FITEE.1700534
18. Han J, Li Y, Chen W. A lightweight and privacy-preserving public cloud auditing scheme without bilinear pairings in smart cities. Computer Standards & Interfaces 2019; 62: 84–97. doi: 10.1016/j.csi.2018.08.004
19. Ding S, Cao J, Li H. Efficient pairing-free CP-ABE based on ordered binary decision diagram. Journal on Communications 2019; 40(12): 1–8. doi: 10.11959/j.issn.1000-436x.2019234
20. Hijawi U, Unal D, Hamila R, et al. Performance evaluation of no-pairing ECC-based KPABE on IoT platforms. In: Proceedings of 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT); 2–5 February 2020; Doha, Qatar. pp. 225–230.
21. Sowjanya K, Dasgupta M. A ciphertext-policy Attribute based encryption scheme for wireless body area networks based on ECC. Journal of Information Security and Applications 2020; 54: 102559. doi: 10.1016/j.jisa.2020.102559
22. Ometov A, Bezzateev S, Makitalo N, et al. Multi-factor authentication: A survey. Cryptography 2018; 2(1): 1. doi: 10.3390/cryptography2010001
23. Anakath AS, Rajakumar S, Ambika S. Privacy preserving multi factor authentication using trust management. Cluster Computing 2019; 22(5): 10817–10823. doi: 10.1007/s10586-017-1181-0
DOI: https://doi.org/10.32629/jai.v6i2.566
Refbacks
- There are currently no refbacks.
Copyright (c) 2023 N. Krishnaveni, C. Jayakumari
License URL: https://creativecommons.org/licenses/by-nc/4.0