Public Encryption Techniques for Cloud Computing: Randomness and Performance Testing

نویسندگان

  • Ayman Helmy Mohamed
  • Aliaa A.A. Youssif
  • Atef Z. Ghalwash
چکیده

Cloud computing becomes the next-generation architecture of IT Enterprises. Cloud computing is a technology. It enables clients to use high-end services in a form of software as a service. These reside on different servers all over the world. There are many security threats in cloud computing. Data security is one of them. Data security raises client concerns. There are many issues of data security. It named maintenance of data integrity, data hiding and data safety. These threats dominate clients concerns when the issue of cloud come up. Cloud computing has a big data. Traditional encryption method is time-consuming in this environment. Cloud computing has a single security architecture. It has also many customers with different demands of security. In this case, data security is considered one of the most important issues in cloud computing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

Data Replication-Based Scheduling in Cloud Computing Environment

Abstract— High-performance computing and vast storage are two key factors required for executing data-intensive applications. In comparison with traditional distributed systems like data grid, cloud computing provides these factors in a more affordable, scalable and elastic platform. Furthermore, accessing data files is critical for performing such applications. Sometimes accessing data becomes...

متن کامل

Ranking CloudService Providers using SWARA and VIKOR (A case of Irancell Company)

Cloud computing is a recent computing paradigm that represents a fundamental change of information commu- nication technology (ICT) services and Cloud services continue to grow rapidly with increasing functionality and more users. As a result of this growth, it is a critical issue to select a suitable Cloud service which meets all the business strategies and the objectives of firms. This paper ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016