• No results found

Storage security and encryption algorithm

Enhanced Security using Hybrid Encryption Algorithm

Enhanced Security using Hybrid Encryption Algorithm

... Cloud Computing is the delivery of computing resources over the internet everything ranging from applications to data centers. It provides the on-demand services on a pay as you use basis. Cloud is something present at ...

7

Markle Hellman Knapsack Crypto System Auditing Scheme for Privacy Preserving in Cloud Storage

Markle Hellman Knapsack Crypto System Auditing Scheme for Privacy Preserving in Cloud Storage

... privacy, security, data loss [12], transparency, and portability [13] are ...cloud storage-auditing model is ...data security, MHKCS algorithm is proposed. This algorithm employs public ...

8

A Survey: Data Security Encryption Scheme over
Cloud Storage

A Survey: Data Security Encryption Scheme over Cloud Storage

... data storage and accessing system is required today, where the digital world require all sort of data in safe and structured ...computing security. The FMSR-DIP codes algorithm that is high ...

6

Detection Through Storage Device: Encryption By AES Algorithm

Detection Through Storage Device: Encryption By AES Algorithm

... selective encryption based on a digital coefficients ...data encryption, steganography, digital signature (Aloka Sinha, Kehar Singh, 2003) and SCAN ...the security of secret ...centralized ...

6

Encrypted Cloud Data Access with Combined Cryptography and Integrity Verification Features

Encrypted Cloud Data Access with Combined Cryptography and Integrity Verification Features

... DES algorithm uses 112 bit key size for data encode and ...DES algorithm is divided into two parts ...time.DES algorithm has one weakness. That is less key size.3DES algorithm essential large ...

5

Enhancing Data Dynamics and Storage Security for Cloud Computing using Merkle Hash Tree and AES Algorithms

Enhancing Data Dynamics and Storage Security for Cloud Computing using Merkle Hash Tree and AES Algorithms

... cloud, security of cloud has become more ...greatest security challenges is storage security in ...cloud storage is of critical importance so that users can restore to a third-party ...

7

A Comparative Analysis of Encryption Techniques and Data Security Issues in Cloud Computing

A Comparative Analysis of Encryption Techniques and Data Security Issues in Cloud Computing

... an encryption algorithm to address the security and privacy issue in cloud storage to protect the data from unauthorized ...symmetric encryption algorithm to protect the data ...

6

Cloud Storage Security Using Encryption and Third-Party Storage Auditing Service

Cloud Storage Security Using Encryption and Third-Party Storage Auditing Service

... Abstract - Cloud computing aims to enable end-users to easily create and use software without a need to worry about the technical implementations and the software's physical hosting location, hardware specifications, ...

7

AES Algorithm Applied on Security Protocol of RFID

AES Algorithm Applied on Security Protocol of RFID

... of storage, EEPROM locates R, if they are the same, then the reader is a legal, then continue the next ...AES encryption to send out. And the encryption results are saved again and refresh the R in ...

5

Advanced encryption standard algorithm based distributed data storage 
		security mechanism (D2S2M) for private cloud

Advanced encryption standard algorithm based distributed data storage security mechanism (D2S2M) for private cloud

... data storage, the contradictions between the privacy protection and data processing are difficult to be ...using encryption-oriented ...Homomorphism Encryption (FHE) [19] and ...

8

Blowfish Implementation on SoloEncrypt Security Model for User Data Protection Prior to Cloud Storage

Blowfish Implementation on SoloEncrypt Security Model for User Data Protection Prior to Cloud Storage

... data security has become increasingly important in the advancement of mobile ...provide security for user data on smartphones by the implementation of Blowfish encryption algorithm prior to ...

6

IMPLEMENTING RSA ENCRYPTION ALGORITHM TO ENHANCE THE DATA SECURITY OF CLOUD IN CLOUD COMPUTING

IMPLEMENTING RSA ENCRYPTION ALGORITHM TO ENHANCE THE DATA SECURITY OF CLOUD IN CLOUD COMPUTING

... decryption algorithm] (i) Retrieve PUBLIC_KEY_N from database using USERNAME (ii) Open file for reading, FD1 = open(FILENAME) (iii) Open another file for writing, FD2 = open(substr(FILENAME,-1)) (iv) Repeat (v) to ...

8

Application research and analysis based on Bitlocker Data protection & Secure Start up of Windows 7

Application research and analysis based on Bitlocker Data protection & Secure Start up of Windows 7

... drive encryption must use NTFS file system, it will automatically decrypt the file system when the encrypted data copy from NTFS encrypted drive to the ...Bitlocker encryption driver are tha same as the ...

7

Enhancing security by altering encryption keys for symmetric algorithm

Enhancing security by altering encryption keys for symmetric algorithm

... An encryption of wireless communication between the Access Points and the nodes can also resolve the ...such security methods may affect the speed, throughput of the network (Mohd Izhar and Singh, ...

6

Review of Various Approaches for Securing Cloud Storage

Review of Various Approaches for Securing Cloud Storage

... The ciphertext in Attribute-based encryption (ABE) scheme is always associated with an attribute [7] [8]. The holder of the master-secret key can pull out a secret key from a policy associated with an attribute so ...

6

IMAGE ENCRYPTION USING BINARY BIT PLANE AND ROTATION METHOD FOR AN IMAGE SECURITY

IMAGE ENCRYPTION USING BINARY BIT PLANE AND ROTATION METHOD FOR AN IMAGE SECURITY

... Image encryption is used to protect the images and transform into different ...lossless encryption for color images using binary key images has been ...lossless encryption of all type of ...

6

Enabling Indirect Mutual Trust for Cloud Storage Systems

Enabling Indirect Mutual Trust for Cloud Storage Systems

... re- encryption keys. A semi-trusted server then uses the proxy re- encryption keys to translate a ciphertext into a form that can be decrypted by a specific granted user, and thus enforces access control of ...

11

Comparative Analysis of Performing Vehicle
          To Vehicle Communication Based On Two
          Tier Approach with High Security

Comparative Analysis of Performing Vehicle To Vehicle Communication Based On Two Tier Approach with High Security

... Josep Domingo-Ferrer and Qianhong Wu discuss Vehicular ad hoc networks (VANETs) will improve traffic safety and efficiency provided that car-to-car communication stays trustworthy. Therefore, it is crucial to ensure ...

6

MoL 2018 04: 
  Quantum Plaintext Non Malleability

MoL 2018 04: Quantum Plaintext Non Malleability

... toring algorithm [Sho99], which can be used against modern-day cryptographic protocols such as ...of security that remain secure in the face of this new ...

48

Enhancing Security Of El Gamal Encryption Scheme Using Rsa And Chaos Algorithm For E-Commerce Application

Enhancing Security Of El Gamal Encryption Scheme Using Rsa And Chaos Algorithm For E-Commerce Application

... proposed encryption scheme, the cryptographic algorithm is simulated using ...MATLAB encryption function accepts data inputs and generates the ciphertext which is to be sent to a ...cryptographic ...

5

Show all 10000 documents...

Related subjects