The growing concern about unauthorized access and tampering with digital images requires the development of robust and secure watermarking methods. Traditional approaches frequently struggle with achieving a balance b...
详细信息
In the past ten years, the technology researches and applications on Cloud Computing have been booming. Depending on large data centers and distributed cluster servers, different layers of Cloud Services make it possi...
详细信息
ISBN:
(纸本)9781467392952
In the past ten years, the technology researches and applications on Cloud Computing have been booming. Depending on large data centers and distributed cluster servers, different layers of Cloud Services make it possible that computing performance becomes stronger, storage space extends vastly and price becomes much lower. With the development of Cloud Computing, countless entrepreneurs and individual users benefit from it. However, it is evident that there exist hidden security problems in individual cloud applications' privacy protection and data safety. At present, the safety of cloud services usually only depends on the security policies provided by cloud service providers and their implementation level. Once users' data and privacy are leaked, it will have a terrible impact on social order besides economic losses. This is an obstacle to the development of cloud computing services. Therefore, our project is going to encrypt users' data in local clients through the blowfish encryption algorithm and then use the interface of cloud computing to upload the encrypted data so that we can establish a perfect data security and privacy's mode protection without affecting the experience and efficiency of use. Because the mode is independent of cloud computing service providers, users' data and privacy security can be guaranteed. It can enhance users' confidence and is good for the further development of cloud services.
Cloud-based fog computing was developed in recent years to make it easier for patients to monitor distant health and discover mosquito-borne syndromes at an initial period, allowing to track the mosquito-borne illness...
详细信息
Cloud-based fog computing was developed in recent years to make it easier for patients to monitor distant health and discover mosquito-borne syndromes at an initial period, allowing to track the mosquito-borne illnesses. Many obstacles have been confronted by the technology, including high latency, mobility, overhead connectivity, and location consciousness. Due to the security issue and wrong prediction of the diseases, users are affected by getting wrong alert messages from fog which increase the disease spreading. Hence a novel Prevention Technique based on Fog Computing has been introduced to prevent the epidemic syndrome at an initial period and safeguard the people around the world. Initially, each user register their personal information in Pristine Database through IoT device. These information are encrypted with 16 round of key-dependent operation via new blowfish encryption algorithm. Subsequently, the mosquito spawned disease is diagnosed by measuring the resemblance factor between the user and disease through the Hybrid Endemic Halsen Classifier and the Resemblance Coefficient are used to diagnose and categorize users as infected or unaffected. The mosquito-borne disease is detected using this method by assessing the similarity factor between the user and the disease with less computing time. As a result, if a new symptom is found rather than one from the given medical dataset, the information will be saved in the Pristine Database, and the classification process will be faster with less computing time in the future if the same symptom is identified. Finally, the novel Temporal Social Network Analysis was developed to assess the likelihood of a disease breakout also analyze the infected users and send the awareness message to take the precautionary measures in the cloud processing layer. Thus, the proposed work effectively predicts and prevents the spreading of epidemic outbreaks with accuracy of 97% which is 7.2% higher than the existing approaches, and
Security is the most critical issue amid transmission of medical images because it contains sensitive information of patients. Medical image security is an essential method for secure the sensitive data when computeri...
详细信息
Security is the most critical issue amid transmission of medical images because it contains sensitive information of patients. Medical image security is an essential method for secure the sensitive data when computerized images and their relevant patient data are transmitted across public networks. In this paper, the dual encryption procedure is utilized to encrypt the medical images. Initially blowfishencryption is considered and then signcryption algorithm is utilized to confirm the encryption model. After that, the Opposition based Flower Pollination (OFP) is utilized to upgrade the private and public keys. The performance of the proposed strategy is evaluated using performance measures such as Peak Signal to Noise Ratio (PSNR), entropy, Mean Square Error (MSE), and Correlation Coefficient (CC).
This paper proposes a scheme to encrypt the key by using password-based encryption technology in order to ensure the safety of the files, which ensuring the confidentiality of documents while also ensuring the securit...
详细信息
This paper proposes a scheme to encrypt the key by using password-based encryption technology in order to ensure the safety of the files, which ensuring the confidentiality of documents while also ensuring the security of the keys;and blowfish symmetric encryptionalgorithm system is analyzed in this paper, the combination of the password and encryptionalgorithm ensures the security of the keys. On this basis, a method of creating self-extracting executable encryption file is described, which makes the password-based encryption independently, and the main method of implementation are given.
暂无评论