2014 International Conference on Information Technology 2014
DOI: 10.1109/icit.2014.20
|View full text |Cite
|
Sign up to set email alerts
|

Securing the Data in Clouds with Hyperelliptic Curve Cryptography

Abstract: Abstract-In today's world, Cloud computing has attracted resea rch communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility, which provides various services over a network, it is prone to network based attacks. Hence security in clouds is the most important in case of cloud computing. Cloud Security concerns the customer to fully rely on storing data on clouds. That is w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 7 publications
(6 reference statements)
0
3
0
Order By: Relevance
“…The user can save the data in the cloud, but because of the lack of security in the cloud, it is possible to lose the trust of users [22]. Mukhopadhyay et al (2014) analyze Cloud computing security issues, rely heavily on customers to store data in the cloud. The key exchange can achieve encryption, signature veri cation, or generation, and hyperelliptic curve cryptography can protect data in the cloud.…”
Section: Dong Et Al (mentioning
confidence: 99%
See 1 more Smart Citation
“…The user can save the data in the cloud, but because of the lack of security in the cloud, it is possible to lose the trust of users [22]. Mukhopadhyay et al (2014) analyze Cloud computing security issues, rely heavily on customers to store data in the cloud. The key exchange can achieve encryption, signature veri cation, or generation, and hyperelliptic curve cryptography can protect data in the cloud.…”
Section: Dong Et Al (mentioning
confidence: 99%
“…The key exchange can achieve encryption, signature veri cation, or generation, and hyperelliptic curve cryptography can protect data in the cloud. Despite the advantages of cloud computing, security is more important [23]. Vanathi et al (2019) discussed that each attack has its own unique attack generation, defence mechanism concerning detection technology, and variety of xed encryption algorithms.…”
Section: Dong Et Al (mentioning
confidence: 99%
“…In 2014 Puneetha and M Dakshayini proposed data security model using ECC algorithm and hash function as digital signature [6]. In 2014 Debajyoti Mukhopadhyay et al proposed method for securing the data in clouds by implementing key agreement, encryption and signature verification/generation with hyperelliptic curve cryptography [7]. In 2014 Swarnalata Bollavarapu and Bharat Gupta proposed data security system.…”
Section: Literature Surveymentioning
confidence: 99%