Enhancing the cloud security using side channel attack free QKD with entangled fuzzy logic.
N. GopinathS. Prayla ShyryPublished in: J. Intell. Fuzzy Syst. (2022)
Keyphrases
- fuzzy logic
- countermeasures
- information security
- security measures
- cyber attacks
- power analysis
- java card
- cloud computing
- fault injection
- secret key
- security vulnerabilities
- authentication mechanism
- security issues
- cloud storage
- key exchange protocol
- neural network
- computational intelligence
- expert systems
- authentication protocol
- denial of service attacks
- fuzzy sets
- security requirements
- key agreement
- malicious users
- control system
- dos attacks
- computer security
- access control
- encryption algorithm
- fuzzy rules
- key management
- security analysis
- decision making
- network security
- attack scenarios
- cloud services
- artificial intelligence
- cloud computing environment
- intrusion detection
- security properties
- smart card
- security mechanisms
- rough sets
- defense mechanisms
- data encryption
- genetic algorithm
- block cipher
- security threats
- authentication scheme
- data center
- computing infrastructure
- attack detection
- elliptic curve
- intelligent control
- security protocols
- encryption scheme
- statistical databases
- penetration testing
- security policies