Study of Data Security Based On Cloud Computing

被引:0
|
作者
Wang, Honghua [1 ]
机构
[1] Huaiyin Inst Technol, Dept Comp Sicence & Engn, Huaian 223003, Jiangsu, Peoples R China
关键词
cloud computing; fully homomorphism encryption; data security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper analysis the core problem of cloud computing: data secure problem, using the newly development of cryprology: fully homomorphism encrytion(FHE) to protect cloud computing data. Put forward data secure scheme based on the character that FHE can operate encrypted data. This scheme not only protect the data, but also can assure the efficency of the application.
引用
收藏
页码:1609 / 1611
页数:3
相关论文
共 50 条
  • [1] A Study in Data Security in Cloud Computing
    Jaber, Aws Naser
    Bin Zolkipli, Mohamad Fadli
    Majid, Mazlina Binti Abdul
    Khan, Nusrat Ullah
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014, : 367 - 371
  • [2] Study on Data Security Mechanism in Cloud Computing
    Sandha
    Durga, M. Ganaga
    [J]. SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 13 - 17
  • [3] Data Security in Cloud Computing
    Sathyanarayana, T. V.
    Sheela, L. Mary Immaculate
    [J]. 2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 822 - 827
  • [4] Data Security in Cloud Computing
    Albugmi, Ahmed
    Alassafi, Madini O.
    Walters, Robert
    Wills, Gary
    [J]. 2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 55 - 59
  • [5] Data security in cloud computing
    Meng, Du
    [J]. PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 810 - 813
  • [6] Threshold Cryptography Based Data Security in Cloud Computing
    Saroj, Sushil Kr
    Chauhan, Sanjeev Kr
    Sharma, Aravendra Kr
    Vats, Sundaram
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 202 - 207
  • [7] Research on the Data Storage Security based on Cloud Computing
    Ma, Xinqiang
    Huang, Yi
    Zhang, Yongdan
    Liu, Youyuan
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 326 - 331
  • [8] The Research of Data Security Mechanism Based on Cloud Computing
    Guo, Changyou
    Zheng, Xuefeng
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 363 - 370
  • [9] Security of Big Data Based on the Technology of Cloud Computing
    Zhou, Xiaojun
    Lin, Ping
    Li, Zhiyong
    Wang, Yunpeng
    Tan, Wei
    Huang, Meng
    [J]. 2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 703 - 706
  • [10] Study on Strategy of Cloud Computing Data Storage Security
    Liu, Sha
    Zhu, Shuhua
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 64 - 67