2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) 2016
DOI: 10.1109/iceeot.2016.7755429
|View full text |Cite
|
Sign up to set email alerts
|

Query based computations on encrypted data through homomorphic encryption in cloud computing security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 3 publications
0
8
0
Order By: Relevance
“…On the off chance that client needs to recover his information or download the information record he have to download both of the record from the cloud server this will leads to play out the operation on a similar record this disregards the security of the distributed storage. [2]There are such a variety of explores have been done to secure duplication check of information on cloud. The distributed storage and information Deduplication are two techniques introduce in existing framework.…”
Section: Fig 1 Cloud Architecture and Servicesmentioning
confidence: 99%
See 4 more Smart Citations
“…On the off chance that client needs to recover his information or download the information record he have to download both of the record from the cloud server this will leads to play out the operation on a similar record this disregards the security of the distributed storage. [2]There are such a variety of explores have been done to secure duplication check of information on cloud. The distributed storage and information Deduplication are two techniques introduce in existing framework.…”
Section: Fig 1 Cloud Architecture and Servicesmentioning
confidence: 99%
“…The distributed storage and information Deduplication are two techniques introduce in existing framework. To begin with technique for the information Deduplication is execute as post handling technique [2] In this which information is first store on the capacity gadget and afterward duplication check is connected on the information. The utilization of this strategy is there is no compelling reason to sit tight for figuring the hash work and the speed of capacity not get downsize.…”
Section: Fig 1 Cloud Architecture and Servicesmentioning
confidence: 99%
See 3 more Smart Citations