2017
DOI: 10.1109/access.2017.2754515
|View full text |Cite
|
Sign up to set email alerts
|

Virtualization of the Encryption Card for Trust Access in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…The proposed Bilinear Diffie-Hellman (BDH) presumption presents a revocable IBE conspire with a key update that takes care of the issue of versatility, computational and correspondence cost. Xu et al [15] proposed another virtualization technology to guarantee dependability. Three thoughts have been actualized, 1) To structure a protection safeguarding model to guarantee the security of the dynamic calendar of encryption cards, 2) an equipment trust check strategy dependent on the confided-in stage, and 3) a progression of security conventions to build up a trusted chain among clients and encryption algorithm.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed Bilinear Diffie-Hellman (BDH) presumption presents a revocable IBE conspire with a key update that takes care of the issue of versatility, computational and correspondence cost. Xu et al [15] proposed another virtualization technology to guarantee dependability. Three thoughts have been actualized, 1) To structure a protection safeguarding model to guarantee the security of the dynamic calendar of encryption cards, 2) an equipment trust check strategy dependent on the confided-in stage, and 3) a progression of security conventions to build up a trusted chain among clients and encryption algorithm.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Initially, a random key is used to encrypt the first block and the subsequent key streams are generated by our cryptosystems based on the below function. The output of the above algorithm produces the key streams from the Jump graph of a web graph starts from 1, 1, 2, 3,4,5,6,1,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25, 26 by doing equivalence modulo 26.…”
Section: Establishment Of Key Streamsmentioning
confidence: 99%
“…The authors look at where fault-tolerant control systems are at now, and where they could be going in the future as far as research goes. In this study [8], author describes use model-based techniques to conduct a reliability analysis of fault-tolerant control systems. Through a case study, the authors present a framework for assessing the dependability of fault-tolerant control systems.…”
Section: Related Workmentioning
confidence: 99%
“…The use of trust and information confidence on MCC allows making the cloud provider more reliable and capable to solve the problem of data credibility. Several researchers ensure the trustworthiness of cloud system by finding the trust server, in [27] with reputation value more than 0.8. This value according to his past feedback, this trust value enables to help mobile users for making the right offloading and solve the security problems such as integrity and confidentiality.…”
Section: Virtualization-based Security Challengesmentioning
confidence: 99%