Generic placeholder image

Recent Advances in Electrical & Electronic Engineering

Editor-in-Chief

ISSN (Print): 2352-0965
ISSN (Online): 2352-0973

Research Article

An Approach of Privacy Preservation and Data Security in Cloud Computing for Secured Data Sharing

In Press, (this is not the final "Version of Record"). Available online 26 January, 2024
Author(s): Revati Raman Dewangan*, Sunita Soni and Ashish Mishal
Published on: 26 January, 2024

DOI: 10.2174/0123520965280683240112085521

Price: $95

Abstract

Introduction: Cloud computing has revolutionized how individuals and businesses engage with data and software, turning the internet into a powerful computing platform by centralizing resources. Despite its benefits, there's a challenge in safeguarding sensitive information stored externally. Cryptography faces threats, particularly chosen-ciphertext attacks aiming for secret keys or system information. While more common in public-key encryption, these attacks are less frequent in symmetrically coded systems. Security efforts include validating system resilience and continuous improvement, which are vital in countering evolving threats like adaptive chosen ciphertext attacks.

Method: In the evaluation model, stringent measures emphasize robust encryption for system security. Despite the planning, no ciphertext attack guarantees success, necessitating adaptive security protocols. Adaptive attacks like CCA2 expose vulnerabilities, enabling attackers to manipulate ciphertexts persistently.

Result: We observe an average gain of 65% for the decryption algorithm. Efforts focus on strengthening security. The flawed 32-bit key-based encryption in the modified Cramer-Shoup structure undergoes remediation.

Conclusion: Conventional uncertainties validate resilience, emphasizing continuous evaluation and enhancement to counter evolving threats.


Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy