用于安全云计算的混合加密模型

Atewologun Olumide, A. Alsadoon, P. Prasad, L. Pham
{"title":"用于安全云计算的混合加密模型","authors":"Atewologun Olumide, A. Alsadoon, P. Prasad, L. Pham","doi":"10.1109/ICTKE.2015.7368466","DOIUrl":null,"url":null,"abstract":"Cloud computing provides a convenient way of content trading and sharing. In this paper, we proposed a secure encryption scheme using advanced encryption standard and fully homomorphic encryption in cloud computing. Firstly, this paper will provide current solutions that are available using encryption technology scheme such as asymmetric and symmetric encryption schemes in cloud computing. The solutions will be analyzed and scrutinized based on their features and limitations. Secondly, from the limitations that are available in current solutions, new algorithm provides comprehensive detail on how encryption method can protect user's confidentiality, integrity and privacy from hackers, malware attack and unauthorized users has proposed. Lastly, the model will be test in the cloud environment, compare the result with previous solutions and evaluate the findings. The analysis and comparison results indicate that the proposed scheme has high efficiency and security.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"A hybrid encryption model for secure cloud computing\",\"authors\":\"Atewologun Olumide, A. Alsadoon, P. Prasad, L. Pham\",\"doi\":\"10.1109/ICTKE.2015.7368466\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing provides a convenient way of content trading and sharing. In this paper, we proposed a secure encryption scheme using advanced encryption standard and fully homomorphic encryption in cloud computing. Firstly, this paper will provide current solutions that are available using encryption technology scheme such as asymmetric and symmetric encryption schemes in cloud computing. The solutions will be analyzed and scrutinized based on their features and limitations. Secondly, from the limitations that are available in current solutions, new algorithm provides comprehensive detail on how encryption method can protect user's confidentiality, integrity and privacy from hackers, malware attack and unauthorized users has proposed. Lastly, the model will be test in the cloud environment, compare the result with previous solutions and evaluate the findings. The analysis and comparison results indicate that the proposed scheme has high efficiency and security.\",\"PeriodicalId\":128925,\"journal\":{\"name\":\"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)\",\"volume\":\"77 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTKE.2015.7368466\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTKE.2015.7368466","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

摘要

云计算提供了一种方便的内容交易和共享方式。本文提出了一种采用先进加密标准和全同态加密的云计算安全加密方案。首先,本文将提供当前可用的加密技术方案,如云计算中的非对称和对称加密方案。将根据解决方案的特点和局限性对其进行分析和审查。其次,从现有解决方案的局限性出发,新算法全面详细地阐述了加密方法如何保护用户的机密性、完整性和隐私免受黑客、恶意软件攻击和未经授权用户的攻击。最后,该模型将在云环境中进行测试,将结果与之前的解决方案进行比较,并评估结果。分析和比较结果表明,该方案具有较高的效率和安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A hybrid encryption model for secure cloud computing
Cloud computing provides a convenient way of content trading and sharing. In this paper, we proposed a secure encryption scheme using advanced encryption standard and fully homomorphic encryption in cloud computing. Firstly, this paper will provide current solutions that are available using encryption technology scheme such as asymmetric and symmetric encryption schemes in cloud computing. The solutions will be analyzed and scrutinized based on their features and limitations. Secondly, from the limitations that are available in current solutions, new algorithm provides comprehensive detail on how encryption method can protect user's confidentiality, integrity and privacy from hackers, malware attack and unauthorized users has proposed. Lastly, the model will be test in the cloud environment, compare the result with previous solutions and evaluate the findings. The analysis and comparison results indicate that the proposed scheme has high efficiency and security.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信