http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Key Aggregate Based Homomorphic Encryption for Efficient Authentication for Secure Cloud Storage
K Ruth Ramya,D Naga Malleswari,Ch Radhika Rani,Debnath Bhattacharyya,Hye-jin Kim 보안공학연구지원센터 2016 International Journal of Database Theory and Appli Vol.9 No.11
Now a day’s data out sourcing is the main focusing term in real time cloud computing applications. Secure data outsourcing is another real time intellectual concept in cloud computing applications for proceeding efficient data transmission. Conventionally Attribute Based Encryption (ABE) performs efficient data security of data outsourcing in cloud. It performs effective data security based on attributes of uploaded data for storage. Attributes are key terms for converting plain file data to Meta (cipher) file, so every time attribute extraction is complexity in data storage in cloud for efficient security analysis. We describe new public cryptographic system which effects fixed size for efficient delegation of decryptions for cipher-texts. So in this paper we propose to KAE (Key Aggregate Encryption) for efficient data security for providing. The novelty is one can aggregate any set of secret keys and make them as complete with single key with power of all the keys been aggregated. We provide security analysis as a development in real time cloud applications for processing access control data delivery between users present in cloud. Our experimental results show efficient security with access control policies in data storage in cloud.
Homomorphic Encryption for Cluster in Cloud
N. Vamshinath,K. Ruth Ramya,Sai Krishna,P. Gopi Bhaskar,Geofrey L. Mwaseba,Tai-hoon Kim 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.5
Data storage and its security have been a distress, since the development of the several computing capabilities. Any potential data mishandling can escalate to leakage or breaching, resultant of this can be decline or impinging of trust, privacy or economical stance of the related cloud delegates. Cloud computing is a new technological trend that enables outsourcing of data into the cloud aimed towards elimination of sneakernet as there is no need for rudimentary storage of data as previously in confined physical storages. During decryption data will be vulnerable for some instant of time, as the plain text can be expose, contrary to homomorphic encryption which promotes privacy of the secured data by allowing some operation to be performed on the encrypted data, The homomorphic encryption is presently available for traditional system, the same procedure is applied to the cloud data and in transit.