Please use this identifier to cite or link to this item: http://dspace.aiub.edu:8080/jspui/handle/123456789/1416
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSen, Anik-
dc.contributor.authorAhmed, Rasel-
dc.contributor.authorHossain, Samiha-
dc.contributor.authorTasnim, Sazzad Hossain-
dc.contributor.authorAhmed, Tanvir-
dc.date.accessioned2023-10-09T06:38:56Z-
dc.date.available2023-10-09T06:38:56Z-
dc.date.issued2023-07-08-
dc.identifier.issn1309-4653-
dc.identifier.urihttp://dspace.aiub.edu:8080/jspui/handle/123456789/1416-
dc.description.abstractSecure data sharing is crucial for protecting sensitive information, and the use of cryptographic protocols, such as the Secure Shell (SSH) protocol, provides an efficient way to achieve this. Found a novel proposed authentication system that combines cryptography and machine learning techniques to ensure secure data sharing within a federated cloud services environment. Their approach involves mutual authentication to establish trust between cooperating entities, threat detection using machine learning algorithms, and cryptography-based key agreement for secure data exchange. They evaluated different classifiers and found that LR, KNN, and DT achieved higher accuracy in malware prediction. Founded another approach where a data-sharing scheme for cloud storage that emphasizes security and efficiency. They introduced a secure cloud storage model utilizing a semi-trusted third party (STTP) for user management, key management, and data processing. By combining a hybrid encryption scheme with a re-encryption protocol, they ensured data confidentiality, unforgeability, and user-centricity. These studies highlight the importance of cryptography in secure data sharing and propose innovative techniques to enhance security and efficiency in data sharing.en_US
dc.language.isoen_USen_US
dc.publisherTürkbilmat Eğitim Hizmetlerien_US
dc.subjectsecure dataen_US
dc.subjectcryptographyen_US
dc.subjectSSHen_US
dc.titleFind out the innovative techniques of data sharing using cryptography by systematic literature reviewen_US
dc.typeArticleen_US
Appears in Collections:Publications: Journals



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.