• Nenhum resultado encontrado

[PDF] Top 20 Homomorphic Encryption Applied to the Cloud Computing Security

Has 10000 "Homomorphic Encryption Applied to the Cloud Computing Security" found on our website. Below are the top 20 most common "Homomorphic Encryption Applied to the Cloud Computing Security".

Homomorphic Encryption Applied to the Cloud Computing Security

Homomorphic Encryption Applied to the Cloud Computing Security

... for the first time the concept of Homomorphic encryption ...years. The encryption system of Shafi Goldwasser and Silvio Micali was proposed in 1982 was a provable security ... See full document

4

Guaranteeing Data Storage Security in Cloud Computing

Guaranteeing Data Storage Security in Cloud Computing

... using the homomorphic token with dispersed confirmation of deletion coded information, our plan accomplishes the capacity rightness protection and information slip confinement: at whatever point ... See full document

4

Security Risk Assessment of Cloud Computing Services in a Networked Environment

Security Risk Assessment of Cloud Computing Services in a Networked Environment

... Cloud security covers several categories. Reference [20] surveyed the research publications on cloud security issues, addressing vulnerabilities, threats, and ...order to ... See full document

12

A survey on top security threats in cloud computing

A survey on top security threats in cloud computing

... for the protection of data in cloud ...existing cloud storages like Amazon S3 and Azure blob to ensure data integrity and confidentiality using ...encryption. To secure data in ... See full document

5

Security in Cloud Computing For Service Delivery Models: Challenges and Solutions

Security in Cloud Computing For Service Delivery Models: Challenges and Solutions

... in the region of cloud computing is dynamic area of ...noted the various risks associated with PaaS service model due to the multitenancy in software ...on the ... See full document

10

Secure Cloud Architecture

Secure Cloud Architecture

... discussed the characteristics of a cloud security that contains threats/attacks and ...implementing cloud computing by expanding their on-premise infrastructure, should be aware of ... See full document

14

Practical Isolated Searchable Encryption in a Trusted Computing Environment

Practical Isolated Searchable Encryption in a Trusted Computing Environment

... All the aforementioned solutions are ...on the Cloud server without interfering; such model implies that sensitive data can never be decrypted on the ...way to execute programs in ... See full document

144

An analysis of the alignment of the contracts for Cloud Computing with the norms and recommendations

An analysis of the alignment of the contracts for Cloud Computing with the norms and recommendations

... working to develop specific safety standards for cloud computing, taking these surveys for a large number of areas including auditing, applications, encryption, governance, network ... See full document

9

Cloud Auditing With Zero Knowledge Privacy

Cloud Auditing With Zero Knowledge Privacy

... for cloud data storage security. Cloud computing security is a major issue that needs to be ...verify the correctness and integrity of data stored on a ...based ... See full document

6

The Risk and Challenges of Cloud Computing

The Risk and Challenges of Cloud Computing

... plans to deploy their data and other applications in private, community and public cloud environments, new security challenges need to be ...Optimal cloud security practices ... See full document

6

Cloud Computing & Grid Computing Environments

Cloud Computing & Grid Computing Environments

... and the later is charged by per GB-Month of storage ...on the source and target of such transfer. The prospect of needing only a credit card to get on-demand access to 100,000+ ... See full document

5

Métodos eficientes para criptografia baseada em reticulados

Métodos eficientes para criptografia baseada em reticulados

... down to O(n lg n) bits, where n is a public parameter of the ...scheme. The new tech- nique also attains faster processing in all operations involved in an asymmetric cryp- tosystem, that is, key ... See full document

96

A Survey of Cloud Computing: Designing, Applications, Security  Issues and Related Technologies

A Survey of Cloud Computing: Designing, Applications, Security Issues and Related Technologies

... ways to reduce power consumption by turning off unused ...begun to study energy-efficient network protocols and ...all the above methods is to achieve a good trade-off between energy savings ... See full document

8

Elliptic Curve Cryptography Services for Mobile Operating Systems

Elliptic Curve Cryptography Services for Mobile Operating Systems

... possible to say that the application is ...appears to be working normally and in the background be sending spam messages either by email or SMS, if such is allowed in the application ... See full document

120

Aplicação da plataforma SaaS - Software as a Service em Enterprise Resource Planning (ERP)

Aplicação da plataforma SaaS - Software as a Service em Enterprise Resource Planning (ERP)

... SaaS é atualmente o tipo de serviço mais popular em cloud computing devido ao seu elevado grau de flexibilidade, desempenho, e menor necessidade de manutenção. Alguns exemplos de SaaS são: Yahoo mail, ... See full document

68

KEY UPDATION FOR THE DYNAMIC ATTRIBUTES IN CLOUD COMPUTING FOR COMPETENT USER RETRACTION

KEY UPDATION FOR THE DYNAMIC ATTRIBUTES IN CLOUD COMPUTING FOR COMPETENT USER RETRACTION

... Cloud computing is a payment-based service where everyone can access computer services through ...internet. Cloud computing [4] allows consumers and businesses to use applications ... See full document

9

E-Commerce Privacy and Security System

E-Commerce Privacy and Security System

... issue. The right of humans for keeping their privacy is debated in many fields, including the areas of law, politics, philosophy, sociology, and more recently computer ...for the e- business ... See full document

12

Encrypted IT Auditing and Log Management on Cloud Computing

Encrypted IT Auditing and Log Management on Cloud Computing

... conducting the investigation studies over the IT auditing for assuring the security for cloud ...over the cloud computing framework in order to assure ... See full document

4

Research, Implementations and Issues on Cloud Computing

Research, Implementations and Issues on Cloud Computing

... has the right tocreate an image, that user usually starts with a “NoApp” or a base-line image ...with the operating system, and extends it with his/her ...of the resources with other ...of the ... See full document

7

Adoção de sistemas cloud computing

Adoção de sistemas cloud computing

... Os autores distinguem duas categorias de frameworks - a provisão de capacidades de armazenamento e a provisão de poder computacional (Weinhardt et al., 2009). Temos como exemplo a empresa Amazon que oferece serviços ... See full document

83

Show all 10000 documents...