Treffer: Security Enhanced Approach BE-MCSDMA with an Health Application in a Java based Environment for Cloud Computing Model.
Weitere Informationen
Cloud computing is the leading technology of the decade, enabling users to store vast amounts of data in cloud storage and access it from anywhere in the world using any terminal. However, because cloud computing relies on the internet, it faces security challenges related to privacy, data security, confidentiality, and authentication. To address these issues, various encryption algorithms and mechanisms are employed. Researchers often combine these methods to enhance data security in the cloud. Security is a paramount concern in cloud computing. Despite robust security measures, the cloud remains vulnerable, which is concerning for organizations. Multi-cloud security, proposed by several researchers as a solution, can become problematic if not designed and implemented with state-of-the-art practices. This issue is especially critical for the healthcare sector, which relies heavily on cloud services and requires effective security architectures. In, a multi-cloud security architecture was proposed with a robust design. The current paper extends this architecture by integrating three additional techniques: one-time authentication codes, digital signatures, and Diffie-Hellman key exchange. These enhancements bolster the security measures and facilitate more secure access to Electronic Health Records (EHRs). Performance comparisons with alternative approaches yield promising results, and attack simulations confirm the architecture's resilience to vulnerabilities. In this context, we propose a "Three Way Mechanism," which integrates an authentication technique, a key exchange algorithm, and an encryption algorithm. This approach aims to provide comprehensive protection by addressing authentication, data security, and verification simultaneously. Specifically, we use a combination of digital signatures, Diffie-Hellman key exchange, and the Advanced Encryption Standard (AES) algorithm to safeguard the confidentiality of data stored in the cloud. [ABSTRACT FROM AUTHOR]
Copyright of Grenze International Journal of Engineering & Technology (GIJET) is the property of GRENZE Scientific Society and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)