MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "a51e5306-51a4-4b6e-8ebd-40c9a72965f2"}, "_deposit": {"id": "3953", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3953"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3953", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Cryptographic Process in Cloud Based System", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Cloud computing technology becomes mostpopular in modern technology environment. Usersstore their data on third-party storage, cloud storageprovider. In this case, security concerns arise toprotect their stored data. So, secure cloud architecturewas proposed and used. In this environment, keymanager includes and produces both private andpublic keys to encrypt and decrypt the user data files. Ifsomeone gets the keys in some way from the keymanager, the data file can easily be opened andchanged. So, I proposed client-side encryption system.This system generates all encryption and decryptionkeys at the client side. The key owner generates bothkey pairs instead of generating at key manger location.This system currently uses Rivest-Shamir-Adleman(RSA) public key cryptosystem to generate keys and toperform cryptographic processes."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Cloud security"}, {"interim": "Encryption"}, {"interim": "Public Key cryptography"}, {"interim": "RSA"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "4.Cryptographic Process in Cloud Based System.pdf", "filesize": [{"value": "161 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 161000.0, "url": {"url": "https://meral.edu.mm/record/3953/files/4.Cryptographic Process in Cloud Based System.pdf"}, "version_id": "75a7bbd3-287b-4ce7-8216-bb4af6bd8899"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Thirteenth International Conferences on Computer Applications(ICCA 2015)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Win, Kyaw Thu"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2015-02-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/167"}, "item_title": "Cryptographic Process in Cloud Based System", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003953", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "3953", "relation": {}, "relation_version_is_last": true, "title": ["Cryptographic Process in Cloud Based System"], "weko_shared_id": -1}
Cryptographic Process in Cloud Based System
http://hdl.handle.net/20.500.12678/0000003953
http://hdl.handle.net/20.500.12678/000000395381e56a85-543e-4de6-ac7d-de4ac02bdba8
a51e5306-51a4-4b6e-8ebd-40c9a72965f2
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Cryptographic Process in Cloud Based System | |||||
Language | en | |||||
Publication date | 2015-02-05 | |||||
Authors | ||||||
Win, Kyaw Thu | ||||||
Description | ||||||
Cloud computing technology becomes mostpopular in modern technology environment. Usersstore their data on third-party storage, cloud storageprovider. In this case, security concerns arise toprotect their stored data. So, secure cloud architecturewas proposed and used. In this environment, keymanager includes and produces both private andpublic keys to encrypt and decrypt the user data files. Ifsomeone gets the keys in some way from the keymanager, the data file can easily be opened andchanged. So, I proposed client-side encryption system.This system generates all encryption and decryptionkeys at the client side. The key owner generates bothkey pairs instead of generating at key manger location.This system currently uses Rivest-Shamir-Adleman(RSA) public key cryptosystem to generate keys and toperform cryptographic processes. | ||||||
Keywords | ||||||
Cloud security, Encryption, Public Key cryptography, RSA | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/167 | |||||
Journal articles | ||||||
Thirteenth International Conferences on Computer Applications(ICCA 2015) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |