2013 IEEE International Conference on Control System, Computing and Engineering 2013
DOI: 10.1109/iccsce.2013.6719955
|View full text |Cite
|
Sign up to set email alerts
|

Use of cryptography in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 40 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…However, these systems have many common features with distributed systems, and data security is the biggest problem in these systems [7]. Jaber et al (2013) projected the architecture of the cloud model, and when it is deployed in the cloud environment, it will threaten the security of existing technology. Therefore, the cloud service user needs to be aware of the dangers while uploading the data to the new environment.…”
Section: Literature Surveymentioning
confidence: 99%
“…However, these systems have many common features with distributed systems, and data security is the biggest problem in these systems [7]. Jaber et al (2013) projected the architecture of the cloud model, and when it is deployed in the cloud environment, it will threaten the security of existing technology. Therefore, the cloud service user needs to be aware of the dangers while uploading the data to the new environment.…”
Section: Literature Surveymentioning
confidence: 99%
“…Encryption for the cloud computing world is an important issue requiring investigation in several studies [8]. Jaber and Bin argue that an example of a significant focus area of encryption in cloud computing is identification based on encryption [9]. Since cloud computing manages crucial data and is accessible anywhere globally through the internet, security is a critical factor and significant concern [10].…”
Section: Cryptographymentioning
confidence: 99%
“…Once the data is encrypted, it is subjected to a deduplication process which maintains more security and redundant data management. In order to offer a secured deduplication process, it is necessary to offer encryption process [9,10]. The process performs permutation of the data that is replicated with a specific secret key where the elements of the replicated data are obtained by applying conventional hash function.…”
Section: Introductionmentioning
confidence: 99%