5 research outputs found

    Secure Digital Information Forward Using Highly Developed AES Techniques in Cloud Computing

    Get PDF
    Nowadays, in communications, the main criteria are ensuring the digital information and communication in the network. The normal two users' communication exchanges confidential data and files via the web. Secure data communication is the most crucial problem for message transmission networks. To resolve this problem, cryptography uses mathematical encryption and decryption data on adaptation by converting data from a key into an unreadable format. Cryptography provides a method for performing the transmission of confidential or secure communication. The proposed AES (Advanced Encryption Standard)-based Padding Key Encryption (PKE) algorithm encrypts the Data; it generates the secret key in an unreadable format. The receiver decrypts the data using the private key in a readable format. In the proposed PKE algorithm, the sender sends data into plain Text to cypher-text using a secret key to the authorized person; the unauthorized person cannot access the data through the Internet; only an authorized person can view the data through the private key. A method for identifying user groups was developed. Support vector machines (SVM) were used in user behaviour analysis to estimate probability densities so that each user could be predicted to launch applications and sessions independently. The results of the proposed simulation offer a high level of security for transmitting sensitive data or files to recipients compared to other previous methods and user behaviour analysis

    Digital Hash Data Encryption for IoT Financial Transactions using Blockchain Security in the Cloud

    Get PDF
    Blockchain security via the Internet of Things (IoT) will reshape the decision-making function of the data-driven incumbent smart enterprise, providing the vision of the connected world of things. Enterprise IoT development of devices, personnel, and systems in such a way that they may connect and communicate with each other through the Internet. Blockchain is an enterprise financial transaction, and its digital network is distributed transaction ledger. Today, enterprises need the massive global data management and rapid trading volume to keep things going and growing. It creates enterprise business challenges of different types of security, transparency, and complexity of the problem. Enterprise architecture offers several advantages for the thief to obtain a specific user account,   application, and access to the device. This is, will doesn't be to provide the necessities of security. The proposed Digital Hash Data Encryption (DHDE) is used to secure the transaction data-based embedded system people and blockchain. Blockchain and IoT technology integration may bring numerous benefits to mention. Therefore, the proposed DHDE algorithm comprehensively discusses the blockchain technology integration system. The proposed DHDE algorithm encrypts the transaction data for an unauthorized person who cannot access the enterprise transaction data based on embedded system people and blockchain

    Compounds of Amino Acids and Neutral Salts

    No full text
    corecore