To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2014, Vol 1, Issue 6
Abstract
The cloud can offer services to the users at lower cost and services are available at anytime, anywhere, user data security is the main challenge in cloud computing. The data encryption is the best way for providing data security in cloud computing. Fully homomorphic encryption scheme is reliable and secure encryption technique. The main problem with fully disk encryption scheme is key management, key storage and data aggregation. To solve the problem of key management and key sharing various schemes are proposed in last few years. The third party auditor is the scheme for key management and key sharing. The third party auditor scheme will be failed if the third party’s security is compromised or third party will be malicious. Cloud computing is very latest technology which is widely used in these days. There are some security threats in this network. The proposed scheme is used to provide security to the cloud so that attacker will unable to hack the information using Diffie- Hellman key exchange protocol. . In Diffie -Hellman algorithm, there is no provision for the storage or exchange of the PIN key. So it protects network devices from attacks.
Authors and Affiliations
Preeti Ahuja
Wireless Multimedia Sensor Network: A Review
Wireless Sensor Network (WSN) is emerging field of research for multimedia communication. A wireless sensor network (WSN) is a network of spatially distributed devices using sensors in a dense manner. This network monito...
Implementation of ZCR and STE techniques for the detection of the voiced and unvoiced signals in Continuous Punjabi Speech
During the analysis of speech signals the evaluation of the basic characteristics of the speech is an important stage. The basic characteristics of speech are voiced, unvoiced and silence. Such characteristics are evalua...
Synthesis and characterization of Schiff base complexes of Zr(IV) and Th(IV) complexes of Schiff base derived from furan 3- carboxaldehyde and 3- amino pyridine
The Schiff base complexes Zr(IV) and Th(IV) of furan 3- carboxaldehyde and 3- amino pyridine were synthesized and characterized by elemental analysis, conductivity measurements, infrared spectral measurements, XRD and an...
Risc Processor Using VHDL
Reduced Instruction Set Computer (RISC) is become a design theory that has accepted in engineering applications. Optimizing gate capacity and performance of FPGA kit. This devices provides complex logic systems to be per...
Cloud Removal From Multi-temporal Satellite Images Using Information Cloning and Information Reconstruction
In this paper, we propose a cloud detection and removal approach based on information cloning. The approach removes cloud-contaminated portions of a satellite image and then reconstructs the information of missing data u...