2017
DOI: 10.1007/978-981-10-2750-5_34
|View full text |Cite
|
Sign up to set email alerts
|

EncryScation: An Secure Approach for Data Security Using Encryption and Obfuscation Techniques for IaaS and DaaS Services in Cloud Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…Therefore, e-commerce platform data must be encrypted, and identity authentication and confidentiality must be further improved. Technological innovation needs to attract more attention (Kumar et al , 2015; Suthar and Patel, 2017). E-commerce platforms should establish a ‘companion’ service mechanism to help farmers realise online shopping, and to control both online and offline service quality.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, e-commerce platform data must be encrypted, and identity authentication and confidentiality must be further improved. Technological innovation needs to attract more attention (Kumar et al , 2015; Suthar and Patel, 2017). E-commerce platforms should establish a ‘companion’ service mechanism to help farmers realise online shopping, and to control both online and offline service quality.…”
Section: Discussionmentioning
confidence: 99%
“…Therefore, e-commerce platform data must be encrypted, and identity authentication and confidentiality must be further improved. Technological innovation needs to attract more attention (Kumar et al , 2015; Suthar and Patel, 2017).…”
Section: Discussionmentioning
confidence: 99%
“…Using SUNDE cloud computing terminal office automation solutions, it can support the company's data application, decision-making, technical information, system security and other specific needs. It also makes a breakthrough in management technology [10].…”
Section: Selection Of Virtual Software Platformmentioning
confidence: 99%
“…When an applied resource does not work, it can be recycled into the memory pool. Online migration means that when a physical machine needs downtime maintenance, the virtual machine can move to another physical machine by internet to ensure that services are not interrupted; The physical machine load equilibrium is that when a physical machine is high load, it can automatically transfer the virtual machine to a lighter physical machine on the condition of not being able to stop it; High availability means that when a physical machine fails, the virtual machine running on it can be started quickly on another physical machine to maximize the continuity of the service [3].…”
Section: Introductionmentioning
confidence: 99%
“…Although the encrypted digital currency is controversial in economics and sociology, the technological innovation has attracted more and more attention. It has been highly evaluated by Bill Gates, Eric Schmidt [13,18]. IBM also has block chain technology, which is TCP/IP in the era of Internet of things.…”
mentioning
confidence: 99%