Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing

Data owners use the huge space offered by ‘Cloud’ Computing for storage of data and also for carrying out computations. To eliminate the burden of storing file locally, cloud stores them on remote servers using virtualization concepts. Therein arises one of the major issues in the field of cloud...

Full description

Bibliographic Details
Main Authors: Devi Thiyagarajan, Ganesan R.
Format: Article
Language:English
Published: Universitas Indonesia 2015-07-01
Series:International Journal of Technology
Subjects:
Online Access:http://ijtech.eng.ui.ac.id/article/view/1394