Open Access. Powered by Scholars. Published by Universities.®
- Discipline
Articles 1 - 2 of 2
Full-Text Articles in Engineering
Chaos-Based Encryption Keys And Neural Key-Store For Cloud-Hosted Data Confidentiality, N.N Mosola, M.T Dlamini, Jonathan Blackledge, J.H.P Eloff, H.S Venter
Chaos-Based Encryption Keys And Neural Key-Store For Cloud-Hosted Data Confidentiality, N.N Mosola, M.T Dlamini, Jonathan Blackledge, J.H.P Eloff, H.S Venter
Conference papers
Cloud computing brings flexible and cost-effective services. However, security concerns plague the cloud. Data confidentiality is one of the security concerns inhibiting the adoption of cloud computing. This concern stems from various cyberattacks directed towards gaining unauthorised access to cloud-bound or cloud-hosted data. This paper proposes a clientend encryption and key management system to curb cyberattacks that target compromising data confidentiality on the cloud.
On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, N. Ptitsyn
On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, N. Ptitsyn
Conference papers
Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘place’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of Iterative Function Systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. …