Innovative Self-Encryption Techniques Using Convergent Algorithms for Decentralized Data Security

Authors

  • K. P. Saurabh, A. R. Raundale

Keywords:

communication, technologies, Consequently, cryptography, transmission

Abstract

As computers and communication technologies have become more widespread over the past few decades, the need for digital information protection has surged. Consequently, cryptography has been adopted by nearly all applications that involve data sharing. This technique ensures that messages exchanged between parties remain secure and unreadable at all times. The aim is to maintain data privacy at the network level. Cryptology relies on two main approaches: cryptography and cryptanalysis. Cryptography involves creating methods to encode information so that it cannot be deciphered by unauthorized parties. Various cryptographic techniques have been developed to protect the privacy of data during transmission. This study aims to establish a robust encryption standard to protect user data stored in the cloud.

Downloads

Download data is not yet available.

References

Gupta, Rajeev & Almuzaini, Khalid & Pateriya, R. & Shah, Kaushal & Shukla, Piyush & Akwafo, Reynah. An Improved Secure Key Generation Using Enhanced Identity-Based Encryption for Cloud Computing in Large-Scale 5G. Wireless Communications and Mobile Computing. 2022. 1-14. 10.1155/2022/7291250, (2022).

Basha, A. & N, Rajkumar & AlZain, Mohammed & Masud, Mehedi & Abouhawwash, Mohamed. Fog-based Self-Sovereign Identity with RSA in Securing IoMT Data. Intelligent Automation & Soft Computing. 34. 1693-1706. 10.32604/iasc.2022.024714, (2022).

Solanki, Luv & Chaudhary, Marmik & Chudasama, Dhaval & Chaudhary, Sumit. A Comparative Study of Hybrid Network Security. 8. 333-338, (2022).

Samanta, Debabrata & Alahmadi, Ahmed & Khan, Mohammad & Banerjee, Amit & Dalapati, Goutam & Ramakrishna, Seeram. Cipher Block Chaining Support Vector Machine for Secured Decentralized Cloud Enabled Intelligent IoT Architecture. IEEE Access. PP. 10.1109/ACCESS.2021.3095297, (2021).

Aruna, M & Mohammad, • & Hasan, Mohammad & Islam, Shayla & Mohan, • & Preeta, • & Hassan, Rosilah. Cloud to cloud data migration using self- sovereign identity for 5G and beyond. Cluster Computing. 10.1007/s10586-021- 03461-7, (2021).

Loukil, Faiza & Ghedira, Chirine & Boukadi, Khouloud & Benharkat, Aïcha- Nabila. Privacy-Preserving IoT Data Aggregation Based on Blockchain and Homomorphic Encryption. Sensors. 21. 2452. 10.3390/s21072452, (2021).

Li, Xiaoyun & Zheng, Zibin & Dai, Hong-Ning. When services computing meets blockchain: Challenges and opportunities. Journal of Parallel and Distributed Computing. 150. 1-14. 10.1016/j.jpdc.2020.12.003, (2021).

Kaur, Manpreet & Gupta, Shikha. Blockchain Technology for Convergence: An Overview, Applications, and Challenges. 10.4018/978-1-7998-6694-7.ch001, (2021).

Naser, s. CRYPTOGRAPHY: FROM THE ANCIENT HISTORY TO NOW, IT'S APPLICATIONS AND A NEW COMPLETE NUMERICAL MODEL. 10.13140/RG.2.2.13438.51524,(2021).

Meraouche, Ishak & DUTTA, Sabyasachi & Tan, Haowen & Sakurai, Kouichi. Neural Networks Based Cryptography: A Survey. IEEE Access. PP. 1-1. 10.1109/ACCESS.2021.3109635, (2021).

Ahmad Jan, Mian & Cai, Jinjin & Gao, Xiang-Chuan & Khan, Fazlullah & Mastorakis, Spyridon & Usman, Muhammad & Alazab, Mamoun & Watters, Paul. Security and Blockchain Convergence with Internet of Multimedia Things: Current Trends, Research Challenges and Future Directions. Journal of Network and Computer Applications. 175. 102918. 10.1016/j.jnca.2020.102918, (2021).

Abbas, Khizar & Tawalbeh, Loai & Rafiq, Ahsan & Muthanna, Ammar & Elgendy, Ibrahim & Abd El-Latif, Ahmed. Convergence of Blockchain and IoT for Secure Transportation Systems in Smart Cities. Security and Communication Networks. 2021. 1-13. 10.1155/2021/5597679, (2021).

Ranathunga, Tharindu & McGibney, Alan & Rea, Susan. The convergence of Blockchain and Machine Learning for Decentralized Trust Management in IoT Ecosystems. 499-504. 10.1145/3485730.3493375, (2021).

Abubaker, Zain & Khan, Asad & Almogren, Ahmad & Abbas, Shahid & Javaid, Atia & Radwan, Ayman & Javaid, Nadeem. Trustful Data Trading through Monetizing IoT Data using BlockChain based Review System. Concurrency and Computation Practice and Experience. 10.1002/cpe.6739, (2021).

Lissiyas Antony & Dr. Sobhana N V A Review Paper on Securing Surveillance Data using Incremental Cryptography International Journal of Engineering Research & Technology (IJERT) Vol. 10 ISSN: 2278-0181, 2021

Downloads

Published

12.08.2024

How to Cite

K. P. Saurabh. (2024). Innovative Self-Encryption Techniques Using Convergent Algorithms for Decentralized Data Security. International Journal of Intelligent Systems and Applications in Engineering, 12(23s), 188 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6700

Issue

Section

Research Article