Please use this identifier to cite or link to this item:
http://dspace.aiub.edu:8080/jspui/handle/123456789/1416
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sen, Anik | - |
dc.contributor.author | Ahmed, Rasel | - |
dc.contributor.author | Hossain, Samiha | - |
dc.contributor.author | Tasnim, Sazzad Hossain | - |
dc.contributor.author | Ahmed, Tanvir | - |
dc.date.accessioned | 2023-10-09T06:38:56Z | - |
dc.date.available | 2023-10-09T06:38:56Z | - |
dc.date.issued | 2023-07-08 | - |
dc.identifier.issn | 1309-4653 | - |
dc.identifier.uri | http://dspace.aiub.edu:8080/jspui/handle/123456789/1416 | - |
dc.description.abstract | Secure data sharing is crucial for protecting sensitive information, and the use of cryptographic protocols, such as the Secure Shell (SSH) protocol, provides an efficient way to achieve this. Found a novel proposed authentication system that combines cryptography and machine learning techniques to ensure secure data sharing within a federated cloud services environment. Their approach involves mutual authentication to establish trust between cooperating entities, threat detection using machine learning algorithms, and cryptography-based key agreement for secure data exchange. They evaluated different classifiers and found that LR, KNN, and DT achieved higher accuracy in malware prediction. Founded another approach where a data-sharing scheme for cloud storage that emphasizes security and efficiency. They introduced a secure cloud storage model utilizing a semi-trusted third party (STTP) for user management, key management, and data processing. By combining a hybrid encryption scheme with a re-encryption protocol, they ensured data confidentiality, unforgeability, and user-centricity. These studies highlight the importance of cryptography in secure data sharing and propose innovative techniques to enhance security and efficiency in data sharing. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Türkbilmat Eğitim Hizmetleri | en_US |
dc.subject | secure data | en_US |
dc.subject | cryptography | en_US |
dc.subject | SSH | en_US |
dc.title | Find out the innovative techniques of data sharing using cryptography by systematic literature review | en_US |
dc.type | Article | en_US |
Appears in Collections: | Publications: Journals |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Find out the innovative techniques of data sharing using cryptography by systematic literature review.docx | 3.64 MB | Microsoft Word XML | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.