Comment on Improved Secure RSA cryptosystem (ISRSAC) for Data Confidentiality in Cloud

被引:3
|
作者
Liu, Chenglian [1 ,2 ]
Hsu, Chieh-Wen [3 ]
机构
[1] Department of Computer Engineering, Dongguan Polytechnic Institute, Dongguan,523808, China
[2] School of Computing, Neusoft Institute of Guangdong, Foshan,528225, China
[3] Economics and Management College, Zhaoqing University, Zhaoqing,526061, China
关键词
D O I
10.6633/IJNS.201907_21(4).20
中图分类号
学科分类号
摘要
引用
收藏
页码:709 / 712
相关论文
共 50 条
  • [31] BLOCKING METHOD FOR RSA CRYPTOSYSTEM WITHOUT EXPANDING CIPHER LENGTH - COMMENT
    MITCHELL, C
    ELECTRONICS LETTERS, 1989, 25 (22) : 1527 - 1527
  • [32] RSA and SFQ based Secure Heuristic Load Balancing Approach for Cloud Data Centers
    Dey, Sweta
    Kaur, Kiran Preet
    Mehak
    Kaur, Upinder
    2019 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2019), 2019,
  • [33] A Confidentiality Preserving Data Leaker Detection Model for Secure Sharing of Cloud Data using Integrated Techniques
    Gupta, Ishu
    Singh, Ashutosh Kumar
    2019 7TH INTERNATIONAL CONFERENCE ON SMART COMPUTING & COMMUNICATIONS (ICSCC), 2019, : 245 - 249
  • [34] Integration of Role Based Access Control with Homomorphic Cryptosystem for Secure and Controlled Access of Data in Cloud
    Sethi, Kamalakanta
    Chopra, Anish
    Bera, Padmalochan
    Tripathy, Bata Krishna
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 194 - 199
  • [35] Secure Communication With Data Analysis and Auditing Using Bilinear Key Aggregate Cryptosystem in Cloud Computing
    Nishoni, Sheji
    Tenis, Aldo A.
    MATERIALS TODAY-PROCEEDINGS, 2020, 24 : 2358 - 2365
  • [36] Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud
    Mageshkumar N.
    Swapna J.
    Pandiaraj A.
    Rajakumar R.
    Krichen M.
    Ravi V.
    International Journal of Intelligent Networks, 2023, 4 : 301 - 309
  • [37] CCSC—DHKEP: Data Confidentiality Using Improved Security Approaches in Cloud Environment
    L. Prabahar
    R. Sukumar
    R. SureshBabu
    Wireless Personal Communications, 2022, 122 : 3633 - 3647
  • [38] An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud
    Neela, K. L.
    Kavitha, V
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 123 (03) : 2431 - 2448
  • [39] An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud
    K. L. Neela
    V. Kavitha
    Wireless Personal Communications, 2022, 123 : 2431 - 2448
  • [40] Improved secure fuzzy auditing protocol for cloud data storage
    Zhang, Jindan
    Wang, Baocang
    He, Debiao
    Wang, Xu An
    SOFT COMPUTING, 2019, 23 (10) : 3411 - 3422