scispace - formally typeset
Search or ask a question
Topic

Client-side encryption

About: Client-side encryption is a research topic. Over the lifetime, 3734 publications have been published within this topic receiving 82657 citations.


Papers
More filters
Proceedings Article
01 Jan 2015
TL;DR: This paper looks at providing security using encryption to protect data/information in institutions by surveyed different types of encryption schemes and cryptographic services.
Abstract: Security is the fundamental concern in information systems and the data they carry that can be in either one of the three states: stationary or in transit or being processed. Institutions usually use computer systems that form part of the Internet/internet to carry their data thus making it vulnerable to attacks. In this paper we look at providing security using encryption to protect data/information. Different types of encryption schemes and cryptographic services are surveyed. Steps to create a cryptographic scheme are illustrated. Merit/demerits of the schemes, challenges and open issues in this area of cryptography are
Patent
04 Jun 2008
TL;DR: In this article, the authors proposed a device and a method for encrypting a data sequence. But they did not specify how to generate a pseudo-random data sequence, and their device and method were not described in detail.
Abstract: The invention relates to the general field of digital security and more particularly cryptography. It proposes in particular a device and a method for encrypting a data sequence. The invention also relates to a cryptographic device (1) and method for generating a pseudo-random data sequence (13) and their favoured use in the field of digital security, namely in particular for data encryption and decryption and for the cryptographic hashing of messages.
01 Jan 2014
TL;DR: This paper proposes a scheme to help enterprises to efficiently share confidential data on cloud servers by first combining the HIBE system and the ciphertext-policy attribute-based encryption (CP-ABE) system, and then making a performance-expressivity trade-off.
Abstract: Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and medium-sized enterprises with limited budgets, they can achieve cost savings and productivity enhancements by using cloud-based services to manage projects, to make collaborations, and the like. However, allowing cloud service providers (CSPs), which are not in the same trusted domains as enterprise users, to take care of confidential data, may raise potential security and privacy issues. To keep the sensitive user data confidential against untrusted CSPs, a natural way is to apply cryptographic approaches, by disclosing decryption keys only to authorized users. However, when enterprise users outsource confidential data for sharing on cloud servers, the adopted encryption system should not only support fine-grained access control, but also provide high performance, full delegation, and scalability, so as to best serve the needs of accessing data anytime and anywhere, delegating within enterprises, and achieving a dynamic set of users. In this paper, we propose a scheme to help enterprises to efficiently share confidential data on cloud servers. We achieve this goal by first combining the hierarchical identity-based encryption (HIBE) system and the ciphertext-policy attribute-based encryption (CP-ABE) system, and then making a performance-expressivity trade-off, finally applying proxy re-encryption and lazy re-encryption to our scheme.
06 May 2015
TL;DR: An important feature of this mechanism is that each party will not need to reveal its own sensitive information when making a global decision with other collaborators, which will support an extensive range of collaboration and create extra business opportunities.
Abstract: Cloud computing is a buzz express which means that accessing and storing of data and programs over the Internet in its position of your computer's hard drive. Protection and secrecy represent major concerns in the acceptance of cloud technologies for information storage. A insolent issue is how to crumble access control policies such that 2 layer encryption can be achieve. To overcome these problem proposed go a step further in the decentralization process in two layer broadcast encryption schema, by eliminate the group manager preliminary unit of the set, with an advantage of the addition of supporting members to the coordination, does not want any central authorization. Our comprehension formulate black-box operate of well-known primeval and can be considered as an enlargement to the subset-cover structure. It permits for efficient substance instantiations, with parameter extent that matches those of the subset-cover constructions; although at the same time achieving the maximum security level in the paradigm representation. It utilize an resourceful scatter group key management scheme to facilitate communicative ACPs. Our coordination assures the confidentiality of the data and preserves the privacy of users from the cloud although delegating most of the access power enforcement to the cloud. Existing market inclination needs Products to be developed at elevated swiftness. To meet those requirements sometimes it requires collaboration between the organizations. Since of the proficient services that are being obtainable by the cloud service providers today, lots of business organizations started compelling advantage of cloud services. Specifically, Cloud computing enables a new form of service in that a service can be realized by components provided by different enterprises or entities in a collaborative manner. Contributing parties are commonly loosely connected and they are responsible for managing and protecting resources/data consign to them. Such situation demands advanced and modern mechanisms for better security and privacy protection of data shared among multiple participating parties. In this, we insinuate accesses manipulate delegation approach that achieves federated security services and preserves autonomy and privacy sharing preferences of involved parties. An important feature of our mechanism is that each party will not need to reveal its own sensitive information when making a global decision with other collaborators, which will support an extensive range of collaboration and create extra business opportunities.
Proceedings ArticleDOI
24 Nov 2009
TL;DR: It will be seen that different encryption schemes are fit for different types of messages, and an intelligent encryption scheme for optimal security is proposed.
Abstract: Wireless LAN (WLAN), despite its popularity, is subject to various security threats. Encrypting the data being transmitted is one of the approaches to address such risks. However, encryption algorithms are known to be computationally intensive and the relation between the strength of encryption and computational intensity is inversely proportional. In this paper, we discuss the challenges in the implementation of encryption algorithm in WLAN. We then compare and analyze the results of experiments to compare these algorithms vis-a-vis their energy consumption. It will be seen that different encryption schemes are fit for different types of messages. We propose an intelligent encryption scheme for optimal security.

Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
89% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
87% related
Server
79.5K papers, 1.4M citations
87% related
Wireless sensor network
142K papers, 2.4M citations
87% related
Wireless ad hoc network
49K papers, 1.1M citations
86% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202358
2022117
20213
202010
20199