Data security for internet plus in public cloud
“Internet plus” has given birth to many new economic forms and business models,the public cloud faces a serious security challenges.The security of public cloud data was studied and the research ideas were put forward.Firstly,the concept of homomorphic encryption,the characteristics of additive homo...
| Published in: | Dianxin kexue |
|---|---|
| Main Authors: | Yongjian WANG, Aibo SONG, Yawei YE, Haibo JIANG |
| Format: | Article |
| Language: | Chinese |
| Published: |
Beijing Xintong Media Co., Ltd
2017-10-01
|
| Subjects: | |
| Online Access: | http://www.telecomsci.com/thesisDetails#10.11959/j.issn.1000-0801.2017241 |
Similar Items
Data security for internet plus in public cloud
by: Yongjian WANG, et al.
Published: (2017-10-01)
by: Yongjian WANG, et al.
Published: (2017-10-01)
Homomorphic Encryption-Based Facial Recognition for Dual-Layer Similarity Analysis of Modified Images
by: Wooyoung Son, et al.
Published: (2025-01-01)
by: Wooyoung Son, et al.
Published: (2025-01-01)
Development of a confidential search algorithm in distributed systems
by: E. M. Shiryaev, et al.
Published: (2023-09-01)
by: E. M. Shiryaev, et al.
Published: (2023-09-01)
Cloud based private data analytic using secure computation over encrypted data
by: Christiana Zaraket, et al.
Published: (2022-09-01)
by: Christiana Zaraket, et al.
Published: (2022-09-01)
SECURITY ANALYSIS OF ONE SOLUTION FOR SECURE PRIVATE DATA STORAGE IN A CLOUD
by: Ludmila Klimentievna Babenko, et al.
Published: (2016-03-01)
by: Ludmila Klimentievna Babenko, et al.
Published: (2016-03-01)
Security research of Internet of Things based on cloud computing
by: NIE Xiao
Published: (2013-04-01)
by: NIE Xiao
Published: (2013-04-01)
Potential of Homomorphic Encryption for Cloud Computing Use Cases in Manufacturing
by: Raphael Kiesel, et al.
Published: (2023-02-01)
by: Raphael Kiesel, et al.
Published: (2023-02-01)
Secure Cloud Computing Using Homomorphic Encryption
by: Alexander Olegovich Zhirov, et al.
Published: (2013-02-01)
by: Alexander Olegovich Zhirov, et al.
Published: (2013-02-01)
Achieving Secure, Verifiable, and Efficient Boolean Keyword Searchable Encryption for Cloud Data Warehouse
by: Somchart Fugkeaw, et al.
Published: (2024-01-01)
by: Somchart Fugkeaw, et al.
Published: (2024-01-01)
Verifiable Statistical Analysis Scheme for Encrypted Medical Data in Cloud Storage
by: ZHANG Xiaojun, ZHANG Jingwei, HUANG Chao, TANG Wei
Published: (2021-06-01)
by: ZHANG Xiaojun, ZHANG Jingwei, HUANG Chao, TANG Wei
Published: (2021-06-01)
Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing
by: Sijjad Ali, et al.
Published: (2024-09-01)
by: Sijjad Ali, et al.
Published: (2024-09-01)
SMedIR: secure medical image retrieval framework with ConvNeXt-based indexing and searchable encryption in the cloud
by: Arun Amaithi Rajan, et al.
Published: (2024-09-01)
by: Arun Amaithi Rajan, et al.
Published: (2024-09-01)
Optimizing encrypted search in the cloud using autoencoder-based query approximation
by: Mahmoud Mohamed, et al.
Published: (2024-12-01)
by: Mahmoud Mohamed, et al.
Published: (2024-12-01)
ESHA-256_GBGO: a high-performance and optimized security framework for internet of medical thing
by: G. Murugan, et al.
Published: (2025-03-01)
by: G. Murugan, et al.
Published: (2025-03-01)
Augmenting The Cloud Environment Security Through Blockchain Based Hash Algorithms
by: RAVI KANTH MOTUPALLI
Published: (2023-03-01)
by: RAVI KANTH MOTUPALLI
Published: (2023-03-01)
High-Secured Data Communication for Cloud Enabled Secure Docker Image Sharing Technique Using Blockchain-Based Homomorphic Encryption
by: Vishnu Kumar Kaliappan, et al.
Published: (2022-07-01)
by: Vishnu Kumar Kaliappan, et al.
Published: (2022-07-01)
Secured cloud-based image data processing of self-driving vehicles using full homomorphic encryption
by: Kamran Saeed, et al.
Published: (2025-10-01)
by: Kamran Saeed, et al.
Published: (2025-10-01)
SYSTEMATIZATION AND ANALYSIS OF PARTIALLY AND FULLY HOMOMORPHIC CRYPTOSYSTEM
by: A. V. Epishkina, et al.
Published: (2016-12-01)
by: A. V. Epishkina, et al.
Published: (2016-12-01)
Secure File Storage On Cloud Using Hybrid Cryptography
by: Jian-Foo Lai, et al.
Published: (2022-09-01)
by: Jian-Foo Lai, et al.
Published: (2022-09-01)
Privacy-preserving digital rights management scheme in cloud computing
by: Qin-long HUANG, et al.
Published: (2014-02-01)
by: Qin-long HUANG, et al.
Published: (2014-02-01)
Privacy-preserving digital rights management scheme in cloud computing
by: Qin-long HUANG, et al.
Published: (2014-02-01)
by: Qin-long HUANG, et al.
Published: (2014-02-01)
Block Cipher Based Public Key Encryption via Indistinguishability Obfuscation
by: Aleksandra Horubała, et al.
Published: (2018-05-01)
by: Aleksandra Horubała, et al.
Published: (2018-05-01)
Cloud Storage Protection Scheme Based on Fully Homomorphic Encryption
by: Mohammed A. Mohammed, et al.
Published: (2020-12-01)
by: Mohammed A. Mohammed, et al.
Published: (2020-12-01)
PyCAN: Open-source Python software of N-dimensional Content-Addressable Network
by: Yuchan Lee, et al.
Published: (2024-12-01)
by: Yuchan Lee, et al.
Published: (2024-12-01)
VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme
by: Yingying Tang, et al.
Published: (2023-03-01)
by: Yingying Tang, et al.
Published: (2023-03-01)
A Comparative Study of Secure Outsourced Matrix Multiplication Based on Homomorphic Encryption
by: Mikhail Babenko, et al.
Published: (2023-04-01)
by: Mikhail Babenko, et al.
Published: (2023-04-01)
Achieving Efficient and Privacy-Preserving Multi-Keyword Conjunctive Query Over Cloud
by: Fan Yin, et al.
Published: (2019-01-01)
by: Fan Yin, et al.
Published: (2019-01-01)
New Similarity measures for Neutrosophic Binary topology using Euclidean distance
by: J.Elekiah, et al.
Published: (2024-05-01)
by: J.Elekiah, et al.
Published: (2024-05-01)
A new approach to comparing the demands of small-sided games
and soccer matches
by: Mauro Mandorino, et al.
Published: (2023-12-01)
by: Mauro Mandorino, et al.
Published: (2023-12-01)
Provable Data Recoverability and Hide-Able Access Pattern Based ORAM
by: Hongwei Li, et al.
Published: (2013-12-01)
by: Hongwei Li, et al.
Published: (2013-12-01)
Provable Data Recoverability and Hide-Able Access Pattern Based ORAM
by: Hongwei Li, et al.
Published: (2013-12-01)
by: Hongwei Li, et al.
Published: (2013-12-01)
Privacy preserving cloud computation using Domingo-Ferrer scheme
by: Abdulatif Alabdulatif, et al.
Published: (2016-01-01)
by: Abdulatif Alabdulatif, et al.
Published: (2016-01-01)
Privacy-preserving trajectory similarity computation method
by: Haining YU, et al.
Published: (2022-11-01)
by: Haining YU, et al.
Published: (2022-11-01)
Privacy-preserving trajectory similarity computation method
by: Haining YU, et al.
Published: (2022-11-01)
by: Haining YU, et al.
Published: (2022-11-01)
Secure e-health cloud framework for patients' EHR storage and sharing for Indian Government healthcare model
by: Vigilson Prem, et al.
Published: (2020-06-01)
by: Vigilson Prem, et al.
Published: (2020-06-01)
Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership
by: Yue CHEN, et al.
Published: (2015-09-01)
by: Yue CHEN, et al.
Published: (2015-09-01)
Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership
by: Yue CHEN, et al.
Published: (2015-09-01)
by: Yue CHEN, et al.
Published: (2015-09-01)
A Color Image Encryption Algorithm Based on Hash Table, Hilbert Curve and Hyper-Chaotic Synchronization
by: Xiaoyuan Wang, et al.
Published: (2023-01-01)
by: Xiaoyuan Wang, et al.
Published: (2023-01-01)
Efficient and HRA Secure Universal Conditional Proxy Re-Encryption for Cloud-Based Data Sharing
by: Huidan Hu, et al.
Published: (2022-09-01)
by: Huidan Hu, et al.
Published: (2022-09-01)
Preserving Big Data Privacy in Cloud Environments Based on Homomorphic Encryption and Distributed Clustering
by: Shatha A. Baker
Published: (2024-03-01)
by: Shatha A. Baker
Published: (2024-03-01)
Similar Items
-
Data security for internet plus in public cloud
by: Yongjian WANG, et al.
Published: (2017-10-01) -
Homomorphic Encryption-Based Facial Recognition for Dual-Layer Similarity Analysis of Modified Images
by: Wooyoung Son, et al.
Published: (2025-01-01) -
Development of a confidential search algorithm in distributed systems
by: E. M. Shiryaev, et al.
Published: (2023-09-01) -
Cloud based private data analytic using secure computation over encrypted data
by: Christiana Zaraket, et al.
Published: (2022-09-01) -
SECURITY ANALYSIS OF ONE SOLUTION FOR SECURE PRIVATE DATA STORAGE IN A CLOUD
by: Ludmila Klimentievna Babenko, et al.
Published: (2016-03-01)
