期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Fortifying Healthcare Data Security in the Cloud:A Comprehensive Examination of the EPM-KEA Encryption Protocol
1
作者 Umi Salma Basha Shashi Kant Gupta +2 位作者 Wedad Alawad SeongKi Kim Salil Bharany 《Computers, Materials & Continua》 SCIE EI 2024年第5期3397-3416,共20页
A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is stil... A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity Operations.We use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional method.This suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data. 展开更多
关键词 Cloud computing healthcare data security enhanced parallel multi-key encryption algorithm(EPM-KEA)
下载PDF
Analysis of Secured Cloud Data Storage Model for Information
2
作者 Emmanuel Nwabueze Ekwonwune Udo Chukwuebuka Chigozie +1 位作者 Duroha Austin Ekekwe Georgina Chekwube Nwankwo 《Journal of Software Engineering and Applications》 2024年第5期297-320,共24页
This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hac... This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system. 展开更多
关键词 CLOUD DATA Information Model Data Storage Cloud Computing security System Data encryption
下载PDF
Optical encryption scheme based on ghost imaging with disordered speckles 被引量:4
3
作者 张玉东 赵生妹 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第5期160-164,共5页
An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the... An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a computational ghost imaging(CGI) system. Then Alice permutes the order of the random speckle patterns and shares the permutation sequence as a secure key to the authorized users. With the secure key, Bob could recover the object with the principle of the CGI system, whereas, the unauthorized users could not obtain any information of the object. The numerical simulations and experimental results show that the proposed scheme is feasible with a small key, simultaneously,it has a higher security. When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any useful information. Meanwhile, the authorized users could recover completely with the secure key. 展开更多
关键词 ghost encryption secure speckle recover authorized disordered users reconstructed PSNR
下载PDF
Multi-authority proxy re-encryption based on CPABE for cloud storage systems 被引量:7
4
作者 Xiaolong Xu Jinglan Zhou +1 位作者 Xinheng Wang Yun Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第1期211-223,共13页
The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in ... The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH). 展开更多
关键词 cloud storage data partition multi-authority security proxy re-encryption attribute-based encryption(ABE).
下载PDF
The Possibility of Applying Spectral Redundancy in Coherent DWDM Systems for Increasing the Data Transmission Rate and Decreasing Nonlinear Effects and Double Rayleigh Scattering with Great Security of Data
5
作者 Alexander Nekuchaev Sergey Shuteev 《Open Journal of Applied Sciences》 2016年第2期89-94,共6页
A new method coherent DWDM system has been proposed. Standard method uses 90 wavelengths with channel capacity 100 G, so total capacity amounts to 9 Terabit, optical power is P. New “channel super” (CS) consists of ... A new method coherent DWDM system has been proposed. Standard method uses 90 wavelengths with channel capacity 100 G, so total capacity amounts to 9 Terabit, optical power is P. New “channel super” (CS) consists of 15 wavelengths, number of CS is 6, so total number of wavelengths is 90 too, total capacity is 6 Terabit, but optical power is 4/15P. Over ULH and EULH markets, standard approach will be forced to reduce the total capacity to 2.4 Terabit with optical power 4/15P as in proposed method. But the new can reach 6 Terabit with the same optical power 4/15P. 展开更多
关键词 Coherent Communications Optical security and encryption Fiber Optics Links and Subsystems
下载PDF
Security enhancement for double-random phase encryption using orthogonally encoded image and electronically synthesized key data
6
作者 In-Ho Lee Myungjin Cho 《Chinese Optics Letters》 SCIE EI CAS CSCD 2015年第1期22-26,共5页
We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fi... We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fixed double-random phase masks for eneryption. In the proposed scheme, we adopt the electronically synthesized key to frequently update the phase mask using a spatial light modulator, and also employ the orthogonal encoding technique to encode the image and electronically synthesized key data, which can enhance the security of both data. We provide detailed procedures for eneryption and decryption of the proposed scheme, and provide the simulation results to show the eneryption effects of the proposed scheme. 展开更多
关键词 DATA security enhancement for double-random phase encryption using orthogonally encoded image and electronically synthesized key data
原文传递
Secret key exchange in ultralong lasers by radiofrequency spectrum coding 被引量:2
7
作者 Alessandro Tonello Alain Barthelemy +6 位作者 Katarzyna Krupa Vincent Kermene Agnes Desfarges-Berthelemot Badr Mohamed Shalaby Sonia Boscolo Sergei K Turitsyn Juan Diego Ania-Castanon 《Light(Science & Applications)》 SCIE EI CAS CSCD 2015年第1期400-404,共5页
We propose a new approach to the generation of an alphabet for secret key exchange relying on small variations in the cavity length of an ultralong fiber laser.This new concept is supported by experimental results sho... We propose a new approach to the generation of an alphabet for secret key exchange relying on small variations in the cavity length of an ultralong fiber laser.This new concept is supported by experimental results showing how the radiofrequency spectrum of the laser can be exploited as a carrier to exchange information.The test bench for our proof of principle is a 50-km-long fiber laser linking two users,Alice and Bob,where each user can randomly add an extra 1-km-long segment of fiber.The choice of laser length is driven by two independent random binary values,which makes such length become itself a random variable.The security of key exchange is ensured whenever the two independent random choices lead to the same laser length and,hence,to the same free spectral range. 展开更多
关键词 fiber lasers fiber optics communications optical security and encryption
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部