Secure cloud computing algorithm using homomorphic encryption and multi-party computation
Citations
17 citations
8 citations
7 citations
Cites methods from "Secure cloud computing algorithm us..."
...The multi-party calculation is integrated along with homographic encryption to propose a novel approach here through which calculations of encrypted data are performed and no decryption technique is required here [12]....
[...]
6 citations
6 citations
References
15,145 citations
"Secure cloud computing algorithm us..." refers background or methods in this paper
...There is a need for an appropriate or more suitable big data infrastructure [1] that supports the storage and processing on a high scale....
[...]
...The cloud computing has become a tool for analyzing big data using shared computing resources while easily handling changes in the volume and variety of the data[1]....
[...]
2,141 citations
"Secure cloud computing algorithm us..." refers background or methods in this paper
...The cloud computing reviewed was presented in the paper [15]....
[...]
...In this paper [15] authors have discussed the relationship between big data and cloud computing, big data storage systems, and Hadoop technology [17], [19]....
[...]
...The Secure MPC [14], [15] offers both confidentialities as well as integrity which is much better than fully homomorphic encryption and verifiable computation....
[...]
1,728 citations
"Secure cloud computing algorithm us..." refers background in this paper
...[13] proposed a scheme which is called Cryptographically Secure Computation [14] in the cloud using the concept of secure multi-party computation....
[...]
...E. Shen et al. [13] proposed a scheme which is called Cryptographically Secure Computation [14] in the cloud using the concept of secure multi-party computation....
[...]
...Secure MPC can be done for arbitrary computations and for any number of parties....
[...]
...The Secure MPC [14], [15] offers both confidentialities as well as integrity which is much better than fully homomorphic encryption and verifiable computation....
[...]
1,495 citations
804 citations