2015 International Conference on Computational Intelligence and Communication Networks (CICN) 2015
DOI: 10.1109/cicn.2015.158
|View full text |Cite
|
Sign up to set email alerts
|

Approach to Enhancing Concurrent and Self-Reliant Access to Cloud Database: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Public key is available for anyone wants to send data while private key is used for decryption. The main issue of this technique is the cost of encryption and decryption process [14].…”
Section: Encryption Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…Public key is available for anyone wants to send data while private key is used for decryption. The main issue of this technique is the cost of encryption and decryption process [14].…”
Section: Encryption Techniquesmentioning
confidence: 99%
“…The focus on recent researches is on preserving the security properties such as confidentiality, integrity and privacy of data in the cloud. Many methods have been proposed to solve issues related to security in the cloud [14].…”
Section: Introductionmentioning
confidence: 99%