2022
DOI: 10.31449/inf.v46i8.4305
|View full text |Cite
|
Sign up to set email alerts
|

Ensuring privacy and confidentiality of data on the cloud using an enhanced homomorphism scheme

Abstract: Cloud computing is one of the widest phenomena embraced in information technology. This result from numerous advantages associated with it making many organizations and individuals offload their data to the cloud. Encryption schemes restrict access to data from unauthorized clients, helping attain confidentiality and privacy. The modification of the ciphertext of clients' data on the cloud demand downloading, deciphering, editing, and finally uploading back to the cloud by sharing their private key with the cl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(14 citation statements)
references
References 22 publications
0
14
0
Order By: Relevance
“…From Tables 4 and 5 , RC4, Salsa20 and Chacha20, had linear (O (N)) mean encryption and decryption times [ 37 ]. This implies that encryption and decryption times increase as data sizes increased [ 14 , 30 , and 38 ]. Tables 4 and 5 , indicates that RC4, had the lowest encryption and decryption standard deviations of Ā±0.522 and Ā±0.363 for data size of 3KB.…”
Section: Discussionmentioning
confidence: 99%
“…From Tables 4 and 5 , RC4, Salsa20 and Chacha20, had linear (O (N)) mean encryption and decryption times [ 37 ]. This implies that encryption and decryption times increase as data sizes increased [ 14 , 30 , and 38 ]. Tables 4 and 5 , indicates that RC4, had the lowest encryption and decryption standard deviations of Ā±0.522 and Ā±0.363 for data size of 3KB.…”
Section: Discussionmentioning
confidence: 99%
“…. The first value is s i , second value s j , the third value s k , fourth value is s l and with M the plaintext as seen in Eq 1 for data encryption [19].…”
Section: Enhanced Homomorphism Schemementioning
confidence: 99%
“…The comparative analysis of the Enhanced RSA [17], Non-Deterministic Cryptographic Scheme [18], Enhanced Homomorphism Scheme [19], Salsa20 and Chacha20 was implemented on an i7 Lenovo computer, 2.10 GHz CPU using C# language. C# programming…”
Section: Experimentationmentioning
confidence: 99%
See 2 more Smart Citations