UCSY's Research Repository

Cryptographic Process in Cloud Based System

Show simple item record

dc.contributor.author Win, Kyaw Thu
dc.date.accessioned 2019-07-03T03:50:12Z
dc.date.available 2019-07-03T03:50:12Z
dc.date.issued 2015-02-05
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/167
dc.description.abstract Cloud computing technology becomes most popular in modern technology environment. Users store their data on third-party storage, cloud storage provider. In this case, security concerns arise to protect their stored data. So, secure cloud architecture was proposed and used. In this environment, key manager includes and produces both private and public keys to encrypt and decrypt the user data files. If someone gets the keys in some way from the key manager, the data file can easily be opened and changed. So, I proposed client-side encryption system. This system generates all encryption and decryption keys at the client side. The key owner generates both key pairs instead of generating at key manger location. This system currently uses Rivest-Shamir-Adleman (RSA) public key cryptosystem to generate keys and to perform cryptographic processes. en_US
dc.language.iso en en_US
dc.publisher Thirteenth International Conferences on Computer Applications(ICCA 2015) en_US
dc.subject Cloud security en_US
dc.subject Encryption en_US
dc.subject Public Key cryptography en_US
dc.subject RSA en_US
dc.title Cryptographic Process in Cloud Based System en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account