The vital idea in the distributed storage is checking uprightness of the remote data. It can provide the client with a check of the outsourced client documents without downloading the entire data. There are a few circ...
详细信息
ISBN:
(纸本)9781509032945
The vital idea in the distributed storage is checking uprightness of the remote data. It can provide the client with a check of the outsourced client documents without downloading the entire data. There are a few circumstances in which client needs their records to be continued numerous cloud servers, to give security and better expectation of cloud servers. The ID-DPDP (identity-based distributed provable data possession) for checking remote data respectability in different cloud servers. The proposed model can give different levels of checks. The ECC (Elliptic Curve Cryptography) calculation is utilized for producing keys and symmetric encryption algorithm for encryption of data and the undermined records idea is presented in our framework additionally to enhance the security of the framework utilize the Se1CSP (Select Cloud Service Provider). Which will check the credibility of cloud service provider organization will likewise gather the client inputs on different cloud specialist organizations check the cloud service provider is noxious or dependable.
With the increasingly extensive application of networking technology, security of network becomes significant than ever before. encryptionalgorithm plays a key role in construction of a secure network system. However...
详细信息
With the increasingly extensive application of networking technology, security of network becomes significant than ever before. encryptionalgorithm plays a key role in construction of a secure network system. However, the encryptionalgorithm implemented on resource-constrained device is difficult to achieve ideal performance. The issue of power consumption becomes essential to performance of data encryptionalgorithm. Many methods are proposed to evaluate the power consumption of encryptionalgorithms yet the authors do not ensure which one is effective. In this study, they give a comprehensive review for the methods of power evaluation. They then design a series of experiments to evaluate the effectiveness of three main types of methods by implementing several traditional symmetric encryption algorithms on a workstation. The experimental results show that external measurement and software profiling are more accurate than that of uninterruptible power system battery. The improvement of power consumption is 27.44 and 33.53% which implies the method of external measurement and software profiling is more effective in power consumption evaluation.
With the rapid development of information technology, information security has become an important topic in the present society. Data encryption Standard(DES) algorithm has been widely used in various fields since it ...
详细信息
With the rapid development of information technology, information security has become an important topic in the present society. Data encryption Standard(DES) algorithm has been widely used in various fields since it has been proposed;however, there are many shortages in the traditional DES algorithm. This paper, taking advantages of Triple DES algorithm and independent sub-key algorithm, proposes a new strategy for encrypting files. Through the means of Key expansion and independent sub-key, the Key security and the encryption strength have been improved. Based on the strategy, this paper designs an encrypted file system and tests various formats of files on it. The test results show that the system is feasible and effective.
A new solution of cloud security is proposed in this paper. It is used the security architecture of cloud computing based on symmetric encryption algorithm, combination key technology and encryption chip hardware. Com...
详细信息
ISBN:
(纸本)9783642273339
A new solution of cloud security is proposed in this paper. It is used the security architecture of cloud computing based on symmetric encryption algorithm, combination key technology and encryption chip hardware. Compared with other cloud security solution, there are some advantages. The security level is higher. The security function is stronger. It is ensured the data is security and integrity transmission. It is guaranteed the security of program running and data storage of client. The real name and rapid login of user is realized, at the same time, the construction and maintenance costs of cloud security system are reduced.
DNA has a great cryptographic strength, its binding properties between nucleotides bases (A-T, C-G) offer the possibility to create self-assembly structures which are an efficient means of executing parallel molecular...
详细信息
ISBN:
(纸本)9783642042911
DNA has a great cryptographic strength, its binding properties between nucleotides bases (A-T, C-G) offer the possibility to create self-assembly structures which are an efficient means of executing parallel molecular computations;its storing capabilities are enormous, a gram of DNA includes 10(21) bases equivalent to 10(8) terra-bytes. Actual implementations don't exceed laboratory level, are expensive and require time. Simple and effective algorithms are quested in order to bring DNA computing on digital level and use it on large scale. This paper presents two original DNA cryptographic algorithms based on existing ideas described in related literature: (1) public key encryption of binary data followed by its transform in DNA digital sequence;(2) XOR one-time-pad cryptographic algorithm, where binary data is transformed in chemically generated DNA structures named tiles.
暂无评论