Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Cloud computing

Conference papers

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Chaos-Based Encryption Keys And Neural Key-Store For Cloud-Hosted Data Confidentiality, N.N Mosola, M.T Dlamini, Jonathan Blackledge, J.H.P Eloff, H.S Venter Sep 2017

Chaos-Based Encryption Keys And Neural Key-Store For Cloud-Hosted Data Confidentiality, N.N Mosola, M.T Dlamini, Jonathan Blackledge, J.H.P Eloff, H.S Venter

Conference papers

Cloud computing brings flexible and cost-effective services. However, security concerns plague the cloud. Data confidentiality is one of the security concerns inhibiting the adoption of cloud computing. This concern stems from various cyberattacks directed towards gaining unauthorised access to cloud-bound or cloud-hosted data. This paper proposes a clientend encryption and key management system to curb cyberattacks that target compromising data confidentiality on the cloud.


On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, N. Ptitsyn Jan 2010

On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, N. Ptitsyn

Conference papers

Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘place’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of Iterative Function Systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. …