Data Confidentiality in Cloud using Multi-party Computation

  • et al.
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A new era has approached where we are storing our information in cloud and performing several computations on powerful servers remotely. In cloud, data is not completely secured and sometimes under the control of untrusted Third parties. Some secured protocols are being implemented. The secure multi-party computation protocol, which is existing, demands the inputs to be encrypted using a public key. So, these reasons limit this Secure Multi-party computation to be employed. In the current paper, we put forward a protocol named homomorphic encryption where the input function is being encrypted by different key. This paper also uses Multi-party computation which is one of the most secured technique in cryptography.

Cite

CITATION STYLE

APA

kumar*, Mr. A. V., Ramya, P., … Lahari, M. (2020). Data Confidentiality in Cloud using Multi-party Computation. International Journal of Innovative Technology and Exploring Engineering, 9(3), 58–62. https://doi.org/10.35940/ijitee.c8015.019320

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free