55 research outputs found

    Cloud Data Security Using Elliptic Curve Cryptography

    Get PDF
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The key issue in effective execution of Cloud Computing is to adequately deal with the security in the cloud applications. This paper talks about the part of cryptography in cloud computing to improve the data security. The expectation here is to get bits of knowledge another security approach with the usage of cryptography to secure information at cloud data centers

    Homomorphic Encryption Security For Cloud Computing

    Get PDF
    As the Data and Technology is increasing day by day the security and privacy issues are becoming a major concern now a days, with the advent of different security mechanisms there are some bottlenecks. In this work we are giving the essence and importance of an encryption scheme called homomorphic encryption and its related issues

    SimpleMOC - A performance abstraction for 3D MOC

    Get PDF
    The method of characteristics (MOC) is a popular method for efficiently solving two-dimensional reactor problems. Extensions to three dimensions have been attempted with mitigated success bringing into question the ability of performing efficient full core three-dimensional (3D) analysis. Although the 3D problem presents many computational difficulties, some simplifications can be made that allow for more efficient computation. In this investigation, we present SimpleMOC, a “mini-app” which mimics the computational performance of a full 3D MOC solver without involving the full physics perspective, allowing for a more straightforward analysis of the computational challenges. A variety of simplifications are implemented that are intended to increase the computational feasibility, including the formation axially-quadratic neutron sources. With the addition of the quadratic approximation to the neutron source, 3D MOC is cast as a CPU-intensive method with the potential for remarkable scalability on next generation computing architectures.United States. Dept. of Energy. Office of Nuclear Energy (Nuclear Energy University Programs Fellowship)United States. Dept. of Energy. Center for Exascale Simulation of Advanced ReactorUnited States. Dept. of Energy. Office of Advanced Scientific Computing Research (Contract DE-AC02-06CH11357

    Somewhat Homomorphic Encryption Technique with its Key Management Protocol

    Get PDF
    Cloud computing has been contemplated as the architecture of various Business organizations, providing easy access to vast data storage and applications services. Most of the cloud service providers encrypt the data only on the network , while some even store the data in encrypted format. This means anyone with access to the cloud servers (cloud service providers) can appropriate it. Even if the data is encrypted during storage, keys are often stored along with your data .Thus an end-to-end encryption scheme has been proposed as a promising solution to data storage on cloud ,in order to perform computations on the encrypted data and thereby store the key securely. Somewhat Homomorphic Encryption is a fully homomorphic encryption technique which is compact, semantically secure with significantly smaller public key and is capable of encrypting integer plaintexts rather than single bits, with comparatively lower expansion and computational complexities Keywords-Cloud computing, Cryptography, Homomorphic Key Management (HKM), Homomorphic encryption, Somewhat Homomorphic encryption(SHE)

    Secure Communication Model for Dynamic Task Offloading in Multi-Cloud Environment

    Get PDF
    As the data is increasing day-by-day, the mobile device storage space is not sufficient to store the complete information and also the computation capacity also is a limited resource which is not sufficient for performing all the required computations. Hence, cloud computing technology is used to overcome these limitations of the mobile device. But security is the main concern in the cloud server. Hence, secure communication model for dynamic task offloading in multi-cloud environment is proposed in this paper. Cloudlet also is used in this model. Triple DES with 2 keys is used during the communication process between the mobile device and cloudlet. Triple DES with 3 keys is used by the cloudlet while offloading the data to cloud server. AES is used by the mobile device while offloading the data to the cloud server. Computation time, communication time, average running time, and energy consumed by the mobile device are the parameters which are used to evaluate the performance of the proposed system, SCM_DTO. The performance of the proposed system, SCM_DTO is compared with ECDH-SAHE and is proved to be performing better

    CRYPTOSYSTEM FROM MULTIPLE BIOMETRIC MODALITIES

    Get PDF
    One of the most important parts of cryptographic systems is key generation. Researchers, for a long time period, have been inventing ways to produce tough and repeatable cryptographic keys. Keys that had these features are hard to be memorized and may be stolen or lost. For this purpose using biometric features to generate cryptographic key is the best way. Most previous Researchers focused to extract features and generate key from an individual biometric, but it is hard to be used in multi stages cryptographic systems. Therefore, this approach is enhancing the cryptographic systems by using long and complex cryptographic keys that are hard to be guessed and do not need to be memorized and provide better usage in multi stages cryptographic systems by extracting features from multi biometrics, That provides accuracy 99.83% with time less than using individual biometric by 90%

    DATA SECURITY IN THE CLOUD USING SERPENT ENCRYPTION AND DISTRIBUTED STEGANOGRAPHY

    Get PDF
    Despite the enormous benefits derived from the adoption of cloud computing concept, its widespread acceptance has been considerably encumbered by security concerns. The enlarged attack surface in a cloud environment makes it more vulnerable to existing and emerging security threats. Conventional data security approaches have been found incapable in curtailing these threats and this unpleasant trend has necessitated the need for a futuristic approach to data security. Serpent encryption algorithm and distributed steganography are already proven techniques for securing data. This paper proposes an enhanced mechanism to ensuring data security by strategically combining serpent cryptographic algorithm and distributed steganography. The unified approach is aimed at leveraging the strength of these two proven techniques to achieve a robust mechanism for ensuring confidentiality and integrity of data in the cloud
    • …
    corecore