A review of cloud security based on cryptographic mechanisms.
Sura Khalil AbdSyed Abdul Rahman Al-HaddadFazirulhisyam HashimAzizol AbdullahPublished in: ISBAST (2014)
Keyphrases
- security protocols
- security mechanisms
- security services
- key management
- security properties
- smart card
- encryption scheme
- security issues
- encryption decryption
- cloud computing
- cryptographic protocols
- encryption key
- high assurance
- fuzzy vault
- intrusion detection
- security requirements
- network security
- public key cryptography
- random number generator
- cryptographic algorithms
- cloud storage
- secure communication
- security systems
- cloud computing environment
- digital signature
- defense mechanisms
- public key encryption
- information security
- literature review
- operating system
- advanced encryption standard
- data center
- elliptic curve cryptography
- security policies
- database systems
- cloud services
- anomaly detection
- packet filtering
- protection schemes
- virtual machine
- encryption algorithms
- public key infrastructure
- resource constrained
- stream cipher
- security analysis
- data security
- high security
- elliptic curve
- security level