使用混合椭圆曲线密码实现和管理工业4.O数据的云安全

Q1 Business, Management and Accounting
N. Krishnamoorthy , S. Umarani
{"title":"使用混合椭圆曲线密码实现和管理工业4.O数据的云安全","authors":"N. Krishnamoorthy ,&nbsp;S. Umarani","doi":"10.1016/j.hitech.2023.100474","DOIUrl":null,"url":null,"abstract":"<div><p>Industry 4.0 places a premium on cloud security since more and more companies are moving their activities to the cloud to reap the benefits of the Fourth Industrial Revolution.The term “cloud computing” refers to a collection of Internet-based hardware and software tools. Providers of cloud services use data centers situated in various physical locations. Cloud computing makes life easier for users by making remote, simulated resources available over the internet. Google Apps and Microsoft SharePoint are two examples of popular cloud applications. In addition to its exciting potential, the “cloud computing” industry's lightning-fast expansion raises serious security concerns. When discussing security, cloud really suffers from Open Systems' and the internet's perennial problem. The only thing stopping the widespread use of cloud computing is the lack of trust in the system. There are a number of security concerns with cloud computing, including protecting user data and vetting cloud service providers' practices. Using encryption, confidential information can be sent over an unsecured channel without fear of data loss or manipulation. Data encryption using various protocols has been used in various settings. Different cryptosystems were developed and used at various times. Additionally, cloud computing enables multiple users to access and retrieve data simultaneously through their own personal Internet connections, which increases the risk of confidential data loss and exposure in a number of different places. Elliptic Curve Cryptography and other cryptographic algorithms have been used to develop numerous methods and protocols that guarantee the security and privacy of transmitted data. In this paper, we suggest a safe and efficient method for sharing information in the cloud without compromising its safety or integrity. The proposed system is able to guarantee authentication and data integrity because it uses a hybrid of the ECC and the Advanced Encryption Standard (AES) technique. The experimental results confirm the proposed approach outperforms the current gold standard.</p></div>","PeriodicalId":38944,"journal":{"name":"Journal of High Technology Management Research","volume":"34 2","pages":"Article 100474"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Implementation and management of cloud security for industry 4.O - data using hybrid elliptical curve cryptography\",\"authors\":\"N. Krishnamoorthy ,&nbsp;S. Umarani\",\"doi\":\"10.1016/j.hitech.2023.100474\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Industry 4.0 places a premium on cloud security since more and more companies are moving their activities to the cloud to reap the benefits of the Fourth Industrial Revolution.The term “cloud computing” refers to a collection of Internet-based hardware and software tools. Providers of cloud services use data centers situated in various physical locations. Cloud computing makes life easier for users by making remote, simulated resources available over the internet. Google Apps and Microsoft SharePoint are two examples of popular cloud applications. In addition to its exciting potential, the “cloud computing” industry's lightning-fast expansion raises serious security concerns. When discussing security, cloud really suffers from Open Systems' and the internet's perennial problem. The only thing stopping the widespread use of cloud computing is the lack of trust in the system. There are a number of security concerns with cloud computing, including protecting user data and vetting cloud service providers' practices. Using encryption, confidential information can be sent over an unsecured channel without fear of data loss or manipulation. Data encryption using various protocols has been used in various settings. Different cryptosystems were developed and used at various times. Additionally, cloud computing enables multiple users to access and retrieve data simultaneously through their own personal Internet connections, which increases the risk of confidential data loss and exposure in a number of different places. Elliptic Curve Cryptography and other cryptographic algorithms have been used to develop numerous methods and protocols that guarantee the security and privacy of transmitted data. In this paper, we suggest a safe and efficient method for sharing information in the cloud without compromising its safety or integrity. The proposed system is able to guarantee authentication and data integrity because it uses a hybrid of the ECC and the Advanced Encryption Standard (AES) technique. The experimental results confirm the proposed approach outperforms the current gold standard.</p></div>\",\"PeriodicalId\":38944,\"journal\":{\"name\":\"Journal of High Technology Management Research\",\"volume\":\"34 2\",\"pages\":\"Article 100474\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of High Technology Management Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S104783102300024X\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Business, Management and Accounting\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of High Technology Management Research","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S104783102300024X","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Business, Management and Accounting","Score":null,"Total":0}
引用次数: 0

摘要

工业4.0重视云安全,因为越来越多的公司将其活动转移到云上,以从第四次工业革命中获益。“云计算”一词是指基于互联网的硬件和软件工具的集合。云服务提供商使用位于不同物理位置的数据中心。云计算通过互联网提供远程模拟资源,让用户的生活更轻松。谷歌应用程序和微软SharePoint是流行的云应用程序的两个例子。除了令人兴奋的潜力外,“云计算”行业闪电般的快速扩张也引发了严重的安全问题。在讨论安全性时,云确实受到了开放系统和互联网长期存在的问题的影响。唯一阻止云计算广泛使用的是对系统缺乏信任。云计算存在许多安全问题,包括保护用户数据和审查云服务提供商的做法。使用加密,可以通过不安全的通道发送机密信息,而不用担心数据丢失或被操纵。使用各种协议的数据加密已经在各种设置中使用。不同的密码系统在不同时期被开发和使用。此外,云计算使多个用户能够通过自己的个人互联网连接同时访问和检索数据,这增加了机密数据在许多不同地方丢失和暴露的风险。椭圆曲线密码和其他密码算法已被用于开发许多方法和协议,以保证传输数据的安全性和隐私性。在本文中,我们提出了一种安全高效的方法,在不损害其安全性或完整性的情况下在云中共享信息。所提出的系统能够保证身份验证和数据完整性,因为它使用了ECC和高级加密标准(AES)技术的混合。实验结果证实了所提出的方法优于当前的金标准。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Implementation and management of cloud security for industry 4.O - data using hybrid elliptical curve cryptography

Industry 4.0 places a premium on cloud security since more and more companies are moving their activities to the cloud to reap the benefits of the Fourth Industrial Revolution.The term “cloud computing” refers to a collection of Internet-based hardware and software tools. Providers of cloud services use data centers situated in various physical locations. Cloud computing makes life easier for users by making remote, simulated resources available over the internet. Google Apps and Microsoft SharePoint are two examples of popular cloud applications. In addition to its exciting potential, the “cloud computing” industry's lightning-fast expansion raises serious security concerns. When discussing security, cloud really suffers from Open Systems' and the internet's perennial problem. The only thing stopping the widespread use of cloud computing is the lack of trust in the system. There are a number of security concerns with cloud computing, including protecting user data and vetting cloud service providers' practices. Using encryption, confidential information can be sent over an unsecured channel without fear of data loss or manipulation. Data encryption using various protocols has been used in various settings. Different cryptosystems were developed and used at various times. Additionally, cloud computing enables multiple users to access and retrieve data simultaneously through their own personal Internet connections, which increases the risk of confidential data loss and exposure in a number of different places. Elliptic Curve Cryptography and other cryptographic algorithms have been used to develop numerous methods and protocols that guarantee the security and privacy of transmitted data. In this paper, we suggest a safe and efficient method for sharing information in the cloud without compromising its safety or integrity. The proposed system is able to guarantee authentication and data integrity because it uses a hybrid of the ECC and the Advanced Encryption Standard (AES) technique. The experimental results confirm the proposed approach outperforms the current gold standard.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of High Technology Management Research
Journal of High Technology Management Research Business, Management and Accounting-Strategy and Management
CiteScore
5.80
自引率
0.00%
发文量
9
审稿时长
62 days
期刊介绍: The Journal of High Technology Management Research promotes interdisciplinary research regarding the special problems and opportunities related to the management of emerging technologies. It advances the theoretical base of knowledge available to both academicians and practitioners in studying the management of technological products, services, and companies. The Journal is intended as an outlet for individuals conducting research on high technology management at both a micro and macro level of analysis.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信