Innovative Self-Encryption Techniques Using Convergent Algorithms for Decentralized Data Security
Keywords:
communication, technologies, Consequently, cryptography, transmissionAbstract
As computers and communication technologies have become more widespread over the past few decades, the need for digital information protection has surged. Consequently, cryptography has been adopted by nearly all applications that involve data sharing. This technique ensures that messages exchanged between parties remain secure and unreadable at all times. The aim is to maintain data privacy at the network level. Cryptology relies on two main approaches: cryptography and cryptanalysis. Cryptography involves creating methods to encode information so that it cannot be deciphered by unauthorized parties. Various cryptographic techniques have been developed to protect the privacy of data during transmission. This study aims to establish a robust encryption standard to protect user data stored in the cloud.
Downloads
References
Gupta, Rajeev & Almuzaini, Khalid & Pateriya, R. & Shah, Kaushal & Shukla, Piyush & Akwafo, Reynah. An Improved Secure Key Generation Using Enhanced Identity-Based Encryption for Cloud Computing in Large-Scale 5G. Wireless Communications and Mobile Computing. 2022. 1-14. 10.1155/2022/7291250, (2022).
Basha, A. & N, Rajkumar & AlZain, Mohammed & Masud, Mehedi & Abouhawwash, Mohamed. Fog-based Self-Sovereign Identity with RSA in Securing IoMT Data. Intelligent Automation & Soft Computing. 34. 1693-1706. 10.32604/iasc.2022.024714, (2022).
Solanki, Luv & Chaudhary, Marmik & Chudasama, Dhaval & Chaudhary, Sumit. A Comparative Study of Hybrid Network Security. 8. 333-338, (2022).
Samanta, Debabrata & Alahmadi, Ahmed & Khan, Mohammad & Banerjee, Amit & Dalapati, Goutam & Ramakrishna, Seeram. Cipher Block Chaining Support Vector Machine for Secured Decentralized Cloud Enabled Intelligent IoT Architecture. IEEE Access. PP. 10.1109/ACCESS.2021.3095297, (2021).
Aruna, M & Mohammad, • & Hasan, Mohammad & Islam, Shayla & Mohan, • & Preeta, • & Hassan, Rosilah. Cloud to cloud data migration using self- sovereign identity for 5G and beyond. Cluster Computing. 10.1007/s10586-021- 03461-7, (2021).
Loukil, Faiza & Ghedira, Chirine & Boukadi, Khouloud & Benharkat, Aïcha- Nabila. Privacy-Preserving IoT Data Aggregation Based on Blockchain and Homomorphic Encryption. Sensors. 21. 2452. 10.3390/s21072452, (2021).
Li, Xiaoyun & Zheng, Zibin & Dai, Hong-Ning. When services computing meets blockchain: Challenges and opportunities. Journal of Parallel and Distributed Computing. 150. 1-14. 10.1016/j.jpdc.2020.12.003, (2021).
Kaur, Manpreet & Gupta, Shikha. Blockchain Technology for Convergence: An Overview, Applications, and Challenges. 10.4018/978-1-7998-6694-7.ch001, (2021).
Naser, s. CRYPTOGRAPHY: FROM THE ANCIENT HISTORY TO NOW, IT'S APPLICATIONS AND A NEW COMPLETE NUMERICAL MODEL. 10.13140/RG.2.2.13438.51524,(2021).
Meraouche, Ishak & DUTTA, Sabyasachi & Tan, Haowen & Sakurai, Kouichi. Neural Networks Based Cryptography: A Survey. IEEE Access. PP. 1-1. 10.1109/ACCESS.2021.3109635, (2021).
Ahmad Jan, Mian & Cai, Jinjin & Gao, Xiang-Chuan & Khan, Fazlullah & Mastorakis, Spyridon & Usman, Muhammad & Alazab, Mamoun & Watters, Paul. Security and Blockchain Convergence with Internet of Multimedia Things: Current Trends, Research Challenges and Future Directions. Journal of Network and Computer Applications. 175. 102918. 10.1016/j.jnca.2020.102918, (2021).
Abbas, Khizar & Tawalbeh, Loai & Rafiq, Ahsan & Muthanna, Ammar & Elgendy, Ibrahim & Abd El-Latif, Ahmed. Convergence of Blockchain and IoT for Secure Transportation Systems in Smart Cities. Security and Communication Networks. 2021. 1-13. 10.1155/2021/5597679, (2021).
Ranathunga, Tharindu & McGibney, Alan & Rea, Susan. The convergence of Blockchain and Machine Learning for Decentralized Trust Management in IoT Ecosystems. 499-504. 10.1145/3485730.3493375, (2021).
Abubaker, Zain & Khan, Asad & Almogren, Ahmad & Abbas, Shahid & Javaid, Atia & Radwan, Ayman & Javaid, Nadeem. Trustful Data Trading through Monetizing IoT Data using BlockChain based Review System. Concurrency and Computation Practice and Experience. 10.1002/cpe.6739, (2021).
Lissiyas Antony & Dr. Sobhana N V A Review Paper on Securing Surveillance Data using Incremental Cryptography International Journal of Engineering Research & Technology (IJERT) Vol. 10 ISSN: 2278-0181, 2021
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.