Elliptic Curve Cryptography in Cloud Architectures With Lower Latency

Download Now
Provided by: The International Journal of Innovative Research in Computer and Communication Engineering
Topic: Cloud
Format: PDF
Cloud computing the revolutionized technology of today includes ease of access and mobility. Cloud outsourcing is vulnerable to attack, as data's are deployed at hostile and unattended environmental nodes. They are not tamper resistant and outsourcing networks are not secure. End to-End data confidentiality assurance should be increased in this design. In this proposal BiLinear Programming (BLP) mechanism outsourcing provides a complete outsourcing solution. It develops a problem transformation technique that enables customer to secretly transform original BLP into some arbitrary one while protecting sensitive input/output information.
Download Now

Find By Topic