Maximizing blockchain security: Merkle tree hash values generated through advanced vectorized elliptic curve cryptography mechanisms

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE(2023)

引用 0|浏览6
暂无评分
摘要
Cloud computing is considered as the most fabulous paradigm to accommodate various kinds of user information. However, the privacy conflicts integrated with computational complexities need more hybridized resource efficiency for hassle-free accession. For this purpose, this article presents a cloud assisted, secured and privacy preserved protocol based on the elliptical curve cryptography (ECC) and blockchain consortium. Blockchain provides an innovative approach for storing information, establishing trust, and various other transactions in an open platform. There exists no single technology as a panacea to obtain optimum privacy and security in the complex cloud environment that needs several desired characteristics. Hence, an elite integration of multiple cryptographic methods by carefully analyzing the potential harms and pitfalls has to be framed to balance the trade-off between privacy and security. The proposed technique highlights the user privacy preservation through guaranteeing that user information is safeguarded from unauthorized use or access. In accordance with that the present study enrolled the advantages of the ECC algorithm, vectorization, and blockchain methods to rule out the limitations of state of art methods. This article attempts to provide the most required privacy with optimum key generation, encryption, and decryption time. The present study has obtained optimal outcomes and the maximum percentage reduction w.r.t the existing method in key generation time, encryption time, and decryption time is given as 14.89%, 16.67%, and 12.5%, respectively.
更多
查看译文
关键词
merkle tree hash values,blockchain security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要