Proceedings ArticleDOI
Secure algorithm for cloud computing and its applications
Akshita Bhandari,Ashutosh Gupta,Debasis Das +2 more
- pp 188-192
TLDR
The proposed schema presents HE-RSA or hybrid encryption RSA along with Advanced Encryption Standard or AES to ensure efficiency, consistency and trustworthiness in cloud servers.Abstract:
Cloud computing is a rising technology that is still unclear to many security issues. The most challenging issue today in cloud servers is to ensure data security and privacy of the users. The proposed schema presents HE-RSA or hybrid encryption RSA along with Advanced Encryption Standard or AES to ensure efficiency, consistency and trustworthiness in cloud servers. The goal of this paper is to use various cryptography concepts during communication along with its application in cloud computing and to enhance the security of ciphertext or encrypted data in cloud servers along with minimizing the consumption of time, cost and memory size during encryption and decryption.read more
Citations
More filters
Journal Article
Secure integration of asymmetric and symmetric encryption schemes
TL;DR: This conversion is the first generic transformation from an arbitrary one-way asymmetricryption scheme to a chosen-ciphertext secure asymmetric encryption scheme in the random oracle model.
Journal ArticleDOI
Security Algorithms in Cloud Computing
Rohini Bhardwaj,Tejinder Sharma +1 more
TL;DR: Diverse calculations will be examined for security of information in distributed computing for cloud computing services.
Proceedings ArticleDOI
A Survey on Data Confidentiality and Privacy in Cloud Computing
TL;DR: This survey presents a review of the three essential data security attributes in the context of Cloud computing, namely, availability, integrity and confidentiality.
Journal ArticleDOI
Hybrid cryptographic approach for internet of things applications: a review
TL;DR: It can be concluded that the hybrid cryptographic approach has been implemented in many IoT cloud computing services and AES and ECC have been found to be the most popular methods used in the hybrid approach due to its computing speed and security resistance among other schemes.
Achieving an Effective, Confidentiality and Integrity of Data in Cloud Computing.
TL;DR: This paper proposes a new cloud scheme to enhance data security, thereby addressing the aforementioned issue whilst achieving a secure cloud storage service and dependability.
References
More filters
Journal ArticleDOI
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
TL;DR: This paper proposes a versatile primitive referred to as conditional identity-based broadcast PRE (CIBPRE) and formalizes its semantic security and shows an application of the CIBPRE to secure cloud email system advantageous over existing secure email systems based on Pretty Good Privacy protocol or identity- based encryption.
Proceedings ArticleDOI
SecCloud: Bridging Secure Storage and Computation in Cloud
TL;DR: This paper proposes SecCloud, a novel auditing scheme to secure cloud computing based on probabilistic sampling technique as well as designated verifier technique, which aims to consider secure data storage, computation and privacy preserving together.
Journal ArticleDOI
A security framework in G-Hadoop for big data computing across distributed Cloud data centres
Jiaqi Zhao,Lizhe Wang,Jie Tao,Jinjun Chen,Weiye Sun,Rajiv Ranjan,Joanna Kolodziej,Achim Streit,Dimitrios Georgakopoulos +8 more
TL;DR: This work proposes a new security model for G-Hadoop, based on several security solutions such as public key cryptography and the SSL protocol, that simplifies the users authentication and job submission process of the current G- Hadoop implementation with a single-sign-on approach.
Journal ArticleDOI
Dual RSA and Its Security Analysis
TL;DR: New variants of an RSA whose key generation algorithms output two distinct RSA key pairs having the same public and private exponents, called dual RSA, can be used in scenarios that require two instances of RSA with the advantage of reducing the storage requirements for the keys.
Book ChapterDOI
Universal Padding Schemes for RSA
TL;DR: It is shown that PSS can also be used for encryption, and gives an encryption scheme semantically secure against adaptive chosen-ciphertext attacks, in the random oracle model, and allows to safely use the same RSA key-pairs for both encryption and signature, in a concurrent manner.