2012 International Conference on Recent Trends in Information Technology 2012
DOI: 10.1109/icrtit.2012.6206833
|View full text |Cite
|
Sign up to set email alerts
|

Integrity checking for cloud environment using encryption algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…The length of the message digest produced by SHA-1 is 160 bytes. The algorithm is highly efficient, however, the client has to use a key that matches the specified set of attributes to be able to retrieve the data [115].…”
Section: Based On Encryption and Secret Key •mentioning
confidence: 99%
“…The length of the message digest produced by SHA-1 is 160 bytes. The algorithm is highly efficient, however, the client has to use a key that matches the specified set of attributes to be able to retrieve the data [115].…”
Section: Based On Encryption and Secret Key •mentioning
confidence: 99%
“…Privacy preservation and trust in cloud using encryption has been proposed by Varalakshmi [3]. The technique relies on a third party for encryption & decryption and uses dynamic small keys which makes key management difficult.…”
Section: Security and Privacy In Cloud Environmentmentioning
confidence: 99%
“…For the four participants, four x values are picked randomly, and substituted in the polynomial function by setting p value to be 251 which is the largest prime number less than 255 (maximum gray image value). Four shares are computed as (1, 222), (2,83), (3,195) and (4,56). They become the first pixel in four image shares.…”
Section: Shamir's Secret Sharing Schemementioning
confidence: 99%
“…The result showed that the system can be applied without need high hardware requirement such as 128 megabyte RAM, 1.2GHz processor. P.Varalakshmi, et al [5] proposed secure cloud computing data store using RSA data encryption algorithm to provide security and privacy for user data on cloud storage. Cloud remote server may be under attack by hackers this breakable the privacy of user or organization data by steels it.…”
Section: Related Workmentioning
confidence: 99%