Abstract:The cloud provides on-demand, high-quality services to its users without the burden of managing hardware and software. Though the users benefit from the remote services provided by the cloud, they do not have their personal data in their physical possession. This certainly poses new security threats for personal and confidential data, bringing the focus back on trusting the use of the cloud for sensitive data. The benefits of the cloud outweigh the concerns raised earlier, and with an increase in cloud usage, … Show more
“…In privacy-preserving techniques, we need a symmetric cryptosystem, such as AES, to encrypt/decrypt communicated messages using a common shared key. In [2], the authors proposed a new shared key generation technique for securing AES. Their research results show that the proposed technique is superior to other existing techniques in terms of security and performance.…”
“…In privacy-preserving techniques, we need a symmetric cryptosystem, such as AES, to encrypt/decrypt communicated messages using a common shared key. In [2], the authors proposed a new shared key generation technique for securing AES. Their research results show that the proposed technique is superior to other existing techniques in terms of security and performance.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.