Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Sundar, R.a; * | Purushotham Reddy, M.b | Sethy, Abhisekc | Selvam, K.d | Abidin, Shafiqule | Chakrabarti, Prasunf | Nagarjuna, Valetig | Ravuri, Anandah | Selvan, P.i
Affiliations: [a] Department of Computer Science & Engineering, Madanapalle Institute of Technology & Science, Annamayya District, Andhra Pradesh, India | [b] Department of Information Technology, Institute of Aeronautical Engineering, Hyderabad, India | [c] Department of Computer Science and Engineering, Silicon Institute of Technology, Bhubaneswar, Odisha, India | [d] Department of Computer Science and Engineering, Kl University, Vadeswaram, Vijayawada, Andrapradesh, India | [e] Department of Computer Science, Aligarh Muslim University, Aligarh, Uttar Pradesh, India | [f] Department of Computer Science and Engineering, Sir Padampat Singhania University, Udaipur, Rajasthan, India | [g] Department of Computer Science and Engineering, Kallam Harinadhareddy Institute of Technology, Chowdavaram, Guntur, Andrapradesh, India | [h] Senior Software Engineer, Intel corporation, Hillsboro, Oregon, USA | [i] Department of EEE, Erode Senguthar Engineering College, Perundurai, Tamilnadu, India
Correspondence: [*] Corresponding author. R. Sundar, Department of Computer science & Engineering, Madanapalle Institute of Technology & Science, Annamayya District, Andhra Pradesh, India. E-mail: sundarcsemits@gmail.com.
Abstract: In today’s rapidly evolving landscape of cloud computing technologies, security and privacy have become paramount concerns, particularly in sectors like healthcare and cloud storage services. One of the most critical challenges is safeguarding sensitive data, such as images, from unauthorized access and leakage during transmission. In this context, we propose a novel framework named Hybrid Buffalo Bat based Homomorphic Convolution (HBBbHC), designed to facilitate the retrieval of source images from encrypted representations during data transmission. The technique efficiently transforms plaintext data into ciphertext, employing blockchain technology for enhanced encryption during the transfer process. We have implemented the HBBbHC method using the Python tool and rigorously evaluated its performance in terms of resource utilization, encryption and decryption efficiency, and other relevant metrics. The results demonstrate that our approach significantly enhances data transmission efficiency, thereby elevating overall system effectiveness
Keywords: Cloud computing, homomorphic, blockchain technology, encryption time, Decryption time
DOI: 10.3233/JIFS-237948
Journal: Journal of Intelligent & Fuzzy Systems, vol. 46, no. 3, pp. 5911-5925, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl