Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking


Index Link

Index Tree

  • RootNode

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "a51e5306-51a4-4b6e-8ebd-40c9a72965f2"}, "_deposit": {"id": "3953", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3953"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3953", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Cryptographic Process in Cloud Based System", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Cloud computing technology becomes mostpopular in modern technology environment. Usersstore their data on third-party storage, cloud storageprovider. In this case, security concerns arise toprotect their stored data. So, secure cloud architecturewas proposed and used. In this environment, keymanager includes and produces both private andpublic keys to encrypt and decrypt the user data files. Ifsomeone gets the keys in some way from the keymanager, the data file can easily be opened andchanged. So, I proposed client-side encryption system.This system generates all encryption and decryptionkeys at the client side. The key owner generates bothkey pairs instead of generating at key manger location.This system currently uses Rivest-Shamir-Adleman(RSA) public key cryptosystem to generate keys and toperform cryptographic processes."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Cloud security"}, {"interim": "Encryption"}, {"interim": "Public Key cryptography"}, {"interim": "RSA"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "4.Cryptographic Process in Cloud Based System.pdf", "filesize": [{"value": "161 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 161000.0, "url": {"url": "https://meral.edu.mm/record/3953/files/4.Cryptographic Process in Cloud Based System.pdf"}, "version_id": "75a7bbd3-287b-4ce7-8216-bb4af6bd8899"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Thirteenth International Conferences on Computer Applications(ICCA 2015)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Win, Kyaw Thu"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2015-02-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/167"}, "item_title": "Cryptographic Process in Cloud Based System", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003953", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "3953", "relation": {}, "relation_version_is_last": true, "title": ["Cryptographic Process in Cloud Based System"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Cryptographic Process in Cloud Based System

http://hdl.handle.net/20.500.12678/0000003953
http://hdl.handle.net/20.500.12678/0000003953
81e56a85-543e-4de6-ac7d-de4ac02bdba8
a51e5306-51a4-4b6e-8ebd-40c9a72965f2
None
Preview
Name / File License Actions
4.Cryptographic 4.Cryptographic Process in Cloud Based System.pdf (161 Kb)
Publication type
Article
Upload type
Publication
Title
Title Cryptographic Process in Cloud Based System
Language en
Publication date 2015-02-05
Authors
Win, Kyaw Thu
Description
Cloud computing technology becomes mostpopular in modern technology environment. Usersstore their data on third-party storage, cloud storageprovider. In this case, security concerns arise toprotect their stored data. So, secure cloud architecturewas proposed and used. In this environment, keymanager includes and produces both private andpublic keys to encrypt and decrypt the user data files. Ifsomeone gets the keys in some way from the keymanager, the data file can easily be opened andchanged. So, I proposed client-side encryption system.This system generates all encryption and decryptionkeys at the client side. The key owner generates bothkey pairs instead of generating at key manger location.This system currently uses Rivest-Shamir-Adleman(RSA) public key cryptosystem to generate keys and toperform cryptographic processes.
Keywords
Cloud security, Encryption, Public Key cryptography, RSA
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/167
Journal articles
Thirteenth International Conferences on Computer Applications(ICCA 2015)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:48:39.388143
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL