Serviceeinschränkungen vom 12.-22.02.2026 - weitere Infos auf der UB-Homepage

Treffer: To secure data classified by SVM methods and stored in the cloud using 3-Tier hybrid encryption algorithm.

Title:
To secure data classified by SVM methods and stored in the cloud using 3-Tier hybrid encryption algorithm.
Source:
AIP Conference Proceedings; 2026, Vol. 3345 Issue 1, p1-10, 10p
Database:
Complementary Index

Weitere Informationen

Now a day, Cloud security has become an important issue. Data in financial, technical, insurance and other corporate organizations need security, so those organizations give high priority to security. If we want to secure any data, first we need to understand the data of different organizations. The second step is to encrypt the data. While encrypting the letters and symbols in this data should be compared with the SVM number values and converted into a data set. Then the accuracy of that data must be determined. The third step is to decrypt the data. While sending IoT data to the cloud, since there are a large number of servers in the cloud and the data contained in it is susceptible to blackhole attack, several precautions need to be taken, three tier hybrid encryption algorithms help to keep this data safe. Features of RSA, AES and DES algorithm are taken in this three-level hybrid encryption algorithm. Using a three-level hybrid encryption algorithm to increase data efficiency when storing IoT data in the cloud overcomes data storage capacity issues in the cloud. By using a three-level hybrid encryption mechanism, the data storage capacity is increased, and the data transfer rate and algorithm execution are excellent. But the feature has to develop power consumption and time saving issues. [ABSTRACT FROM AUTHOR]

Copyright of AIP Conference Proceedings is the property of American Institute of Physics and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)