ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Management (IJM) (Vol.11, No. 10)

Publication Date:

Authors : ;

Page : 1046-1052

Keywords : CSP; TPA; Homomorphic Signature; Verification; Cryptography;

Source : Downloadexternal Find it from : Google Scholarexternal


Cloud computing can be depicted as a disseminated plan that is available to various types of security interruptions. An encoding strategy named homomorphic encoding is utilized for the encoding of elements which are used for the promotion of data from cloud server. The fundamental issues of homomorphic encoding scheme are key association and key assignment. In light of these issues, adequacy of homomorphic encryption approach diminishes. Numerous kinds of encryption algorithms were applied in the cloud for making sure about the data. Data can be put away in the cloud in an encoded structure. In this way, another procedure called Homomorphic encryption is acquainted that permits with apply explicit procedure on the encoded data. We proposed homomorphic signature scheme for secured auditing system cloud user's delicate data with the utilization of binary tree. The proposed homomorphic encryption schemes appear to be a viable method to crush their constraints and to profit by their opposition against the privacy assaults. Also, the assurance assessment and exploratory investigation recommend that our scheme is secured and skillful

Last modified: 2021-02-01 20:10:03