Cloud computing and security final

  • Published on

  • View

  • Download


Cloud Computing and securityCloud Computing and securityWith Homomorphic EncryptionThe ConclusionSession 1-Intro To CloudWhat is Cloud?Types of CloudComponentsAdvantagesDisadvantageSession 2-Basics of SecurityPrinciples of SecurityTypes of attacksCryptography techniquesTypes of CryptographyHashing-Physical & DigitalData level SecuritySession 3-Homorphic EncryptionVarious AlgorithmsRSAAn Example (sort of!)ConclusionPapersKutub Thakur, An Investigation on Cyber Security Threats and Security Models, 2015 IEEEMaha TEBAA and EL HAJII, Secure Cloud Computing through Homomorphic Encryption", University Mohammed VAgdalDarko Hrestak and Stjepan Picek, Homomorphic Encryption in the cloud", University of Zagreb, Croatia.Some AlgorithmsRSA Digital Signatures, iBanking, Credit Card TransactionsPaillier Algorithm E Voting systemsEnhanced Homomorphic Cryptosystem(EHC)-Efficient Secure Message transmission in mobile AdHoc NetworksBGV Encryption Scheme - Encrypt bits, Security of integer polynomialsInsight into RSAKey GenerationStep 1 : Each user generates a public-private key pair by selecting two large primes at random say p & q. Step 2 : Computing RSA-modulus N = p . q & (N) = (p-1) (q-1). Step 3 : Selecting at random, the encryption key e where, 1


View more >