Implementation of hybrid cryptographic schemes in a cloud environment for enhanced medical data security
Publish Year: 1400
Type: Journal paper
Language: English
View: 210
This Paper With 16 Page And PDF Format Ready To Download
- Certificate
- I'm the author of the paper
Export:
Document National Code:
JR_IJNAA-12-2_137
Index date: 2 December 2022
Implementation of hybrid cryptographic schemes in a cloud environment for enhanced medical data security abstract
Nowadays, several security architectures in cloud computing were employed in several applications, but they failed to secure the cloud data entirely. The current approaches use the ensemble algorithm for the decryption and encryption purpose to enhance the security technique. The input medical dataset is usually raw and might contain redundant packets and missing values. Initially, the data is preprocessed by means of the normalization technique. By using Enhanced Principal Component Analysis (EPCA) method, various attributes of the data can be obtained. After the extraction process, the classification mechanism is carried out for recognizing the attacks. The attack is predicted and is classified by means of the Adaptive AlexNet CNN classifier algorithm. A hybrid cryptographic technique in a cloud environment for improving the security rate and providing privacy preservation of the medical data in the cloud environment is presented. The proposed work mainly concentrates mostly on implementing hybrid cryptographic schemes which include AES algorithm, enhanced honeypot algorithm, SHA3 hashing and OTP in the cloud environment. It enhances the security of the data to a great extent. Thus, the presented technique is secured effectively that makes the intruders difficult to access the system as they need to attain control over servers.
Implementation of hybrid cryptographic schemes in a cloud environment for enhanced medical data security Keywords:
cloud computing , encryption , decryption , Enhanced Principal Component Analysis , Adaptive AlexNet CNN classifier , cryptographic technique , enhanced honeypot algorithm , SHA3 hashing and OTP