Chaos-based Encryption Keys and Neural Key-store for Cloud-hosted Data Confidentiality

Southern Africa Telecommunication Networks and Applications Conference (SATNAC) 2017, 3-10 September 2017, Freedom of the Seas Cruise

[1]  Sushil Jajodia,et al.  Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.

[2]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[3]  Sean Hallgren,et al.  Quantum algorithms for some hidden shift problems , 2003, SODA '03.

[4]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[5]  Vasilios Zorkadis,et al.  On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators , 2003, Neural Networks.

[6]  Krishan Kumar,et al.  A Symmetric Key Cryptographic Algorithm Using Counter Propagation Network (CPN) , 2014, ICTCS '14.

[7]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.

[8]  Wolfgang Kinzel,et al.  Neural cryptography , 2002, Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02..

[9]  Neeraj Kumar,et al.  Detection of Data Leakage in Cloud Computing Environment , 2014, 2014 International Conference on Computational Intelligence and Communication Networks.

[10]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[11]  Ahmed Shawish,et al.  Cloud Computing: Paradigms and Technologies , 2014 .

[12]  Richard J. Lipton,et al.  Searching for Elements in Black Box Fields and Applications , 1996, CRYPTO 1996.

[13]  Mark Ryan,et al.  Cloud computing privacy concerns on our doorstep , 2011, Commun. ACM.