首页> 外文期刊>International Journal of Business Intelligence and Data Mining >Optimal blowfish algorithm-based technique for data security in cloud
【24h】

Optimal blowfish algorithm-based technique for data security in cloud

机译:基于最优河豚算法的云数据安全技术

获取原文
获取原文并翻译 | 示例
           

摘要

The cloud computing has elegantly emerged as a unique category of computing which is invariably dependent on sharing computing resources reasonably possessing the local servers or personal devices to successfully address the applications. For the purpose of effectively overcoming the related issues, an optimal blowfish algorithm-based approach is envisioned for the effective encryption and decryption. In the relative step, an innovative signcryption algorithm is elegantly employed for signature authentication. The key manager is entrusted with the task of authenticating the policy related to the file. If the policy precisely corresponds to the file name, then an identical public key is created. If not, a new public key is generated and with the help of public key and private key, the file is encrypted and uploaded into the cloud. The proposed method provides higher security in terms of the data usage for individual persons.
机译:云计算已经优雅地成为一种独特的计算类别,它始终依赖于共享合理拥有本地服务器或个人设备的计算资源来成功解决应用程序。为了有效克服相关问题,设想了一种基于最佳河豚算法的有效加密和解密方法。在相对的步骤中,一种新颖的签密算法被优雅地用于签章认证。密钥管理器负责验证与文件有关的策略。如果策略恰好与文件名相对应,则将创建相同的公共密钥。如果没有,则生成一个新的公共密钥,并在公共密钥和私有密钥的帮助下,文件被加密并上传到云中。所提出的方法就个人的数据使用而言提供了更高的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号