Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud.
Pranav ShrivastavaBashir AlamMansaf AlamPublished in: Clust. Comput. (2023)
Keyphrases
- information security
- cellular automata
- cloud computing
- encryption algorithms
- security issues
- security requirements
- intrusion detection
- cloud computing environment
- cryptographic algorithms
- elliptic curve cryptography
- network security
- cloud storage
- access control
- public key cryptography
- image processing
- security policies
- statistical databases
- chaotic dynamics
- security analysis
- elliptic curve
- image enhancement
- security mechanisms
- information systems
- computing infrastructure
- sensitive data
- boundary value problem
- security level
- security systems
- key management
- provably secure
- cloud services
- data center
- hopfield neural network
- encryption scheme