2022
DOI: 10.1007/s10844-022-00715-7
|View full text |Cite
|
Sign up to set email alerts
|

Design of fully homomorphic multikey encryption scheme for secured cloud access and storage environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…The research paper titled "Design of Fully Homomorphic Multikey Encryption Scheme for Secured Cloud Access and Storage Environment" by Dilli Babu Salvakkam 1 and Rajendra Pamula 2 was published in the year 2022 [6]. The technique that can be used to develop a system for exchanging data that is affordable since it offers backward and forward security.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The research paper titled "Design of Fully Homomorphic Multikey Encryption Scheme for Secured Cloud Access and Storage Environment" by Dilli Babu Salvakkam 1 and Rajendra Pamula 2 was published in the year 2022 [6]. The technique that can be used to develop a system for exchanging data that is affordable since it offers backward and forward security.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Salvakkam et al (Salvakkam & Pamula, 2022) identify data privacy and security as a major barrier to cloud storage adoption. They propose a new method for secure cloud storage that uses a combination of passwords, biometrics, and Fully Homomorphic Multi-key Encryption (FHE) to address this concern.…”
Section: Papers In Special Sectionmentioning
confidence: 99%
“…Cloud computing alters the idea of sharing, processing, and saving data from conventional IT into integrated services provided by cloud providers [3]. The ondemand routing method is easy for sharing routes broadcast or non-broadcast information, and it allows users for utilizing the required services of cloud computing without any contact among the consumers and service providers [4]. Customers who are using the cloud services don't require to know about the exact location of their data in the cloud or be conscious of which machine in the network is developing its computational tasks [5].…”
Section: Introductionmentioning
confidence: 99%