2017
DOI: 10.4236/cs.2017.83005
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Public Key Cryptography Scheme for Securing Data in Cloud Computing

Abstract: Numerous advancements in the Information Technology (IT) require the proper security policy for the data storage and transfer among the cloud. With the increase in size of the data, the time required to handle the huge-size data is more. An assurance of security in cloud computing suffers various issues. The evolution of cryptographic approaches addresses these limitations and provides the solution to the data preserving. There are two issues in security assurance such as geographical distribution and the mult… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 13 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…Taher ElGamal described a public cryptosystem and signature scheme based on the difficulty of computing discrete logarithms in [7]. Athena et al introduced elliptic curve cryptography (ECC) uses the properties of elliptic curves to generate keys in [8]. In [9] Freeman used primeorder elliptic curve groups to construct secure pairing-based cryptosystem.…”
Section: Introductionmentioning
confidence: 99%
“…Taher ElGamal described a public cryptosystem and signature scheme based on the difficulty of computing discrete logarithms in [7]. Athena et al introduced elliptic curve cryptography (ECC) uses the properties of elliptic curves to generate keys in [8]. In [9] Freeman used primeorder elliptic curve groups to construct secure pairing-based cryptosystem.…”
Section: Introductionmentioning
confidence: 99%