{"created":"2020-09-01T13:48:33.898930+00:00","id":3953,"links":{},"metadata":{"_buckets":{"deposit":"a51e5306-51a4-4b6e-8ebd-40c9a72965f2"},"_deposit":{"id":"3953","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3953"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3953","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Cryptographic Process in Cloud Based System","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Cloud computing technology becomes mostpopular in modern technology environment. Usersstore their data on third-party storage, cloud storageprovider. In this case, security concerns arise toprotect their stored data. So, secure cloud architecturewas proposed and used. In this environment, keymanager includes and produces both private andpublic keys to encrypt and decrypt the user data files. Ifsomeone gets the keys in some way from the keymanager, the data file can easily be opened andchanged. So, I proposed client-side encryption system.This system generates all encryption and decryptionkeys at the client side. The key owner generates bothkey pairs instead of generating at key manger location.This system currently uses Rivest-Shamir-Adleman(RSA) public key cryptosystem to generate keys and toperform cryptographic processes."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Cloud security"},{"interim":"Encryption"},{"interim":"Public Key cryptography"},{"interim":"RSA"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-03"}],"displaytype":"preview","filename":"4.Cryptographic Process in Cloud Based System.pdf","filesize":[{"value":"161 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3953/files/4.Cryptographic Process in Cloud Based System.pdf"},"version_id":"75a7bbd3-287b-4ce7-8216-bb4af6bd8899"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Thirteenth International Conferences on Computer Applications(ICCA 2015)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Win, Kyaw Thu"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2015-02-05"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/167"},"item_title":"Cryptographic Process in Cloud Based System","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-03","publish_status":"0","recid":"3953","relation_version_is_last":true,"title":["Cryptographic Process in Cloud Based System"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T00:50:56.549276+00:00"}