Review on Data Security in Homomorphic Encryption
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 7
Abstract
The cloud computing is the architecture in which hosts, virtual machines, data centers and cloud service providers are involved in the communication. In the network, two types of encryption schemes are implemented to provide security in the network. These encryption schemes are fully homomorphic encryption and fully disk encryption scheme. In this paper, fully disk encryption and fully homomorphic scheme has been reviewed and discussed.
Authors and Affiliations
Rashi Sood, Munish Katoch
Accident Prevention Using VANET
A Vehicular Ad-Hoc Network (VANET) may be a sort of Mobile ad-hoc network, to supply communication among close vehicles. Driver’s tiredness cause maximum number of automobile accidents. To deal with the matter we tend t...
A Novel Three-Phase to Nine-Phase Transformation Using a Special Transformer Connection
Multiphase (more than three-phase) electric drive system is the priority of an important research in the last decade. Three-phase supply is available from the grid, however for many industrial applications multiphase su...
QOS Improved Load Balancing Framework for Wireless Networks
Quality-of-service (QoS) is very important issues in load balancing and task scheduling process in distributed network system. The non-efficient load balancing and task scheduling algorithm decreases Quality-of-service...
Installation of PLC and HMI in Lever SPM
The machinery should be up to date to supply the high quality product in market for to maintain the user (market) requirement. This project work is based on the up gradation of the LEVER SPM (Special Purpose Machine). A...
Analysis and Comprehensive Study: Image Segmentation Techniques
Image Segmentation plays a vital role in extracting image information from dull and noisy images. Further, image segmentation is the key step in processing images of different types. In last two decades, image segmentat...