Skip to main content

2018 | OriginalPaper | Buchkapitel

Security Homomorphic Encryption Scheme Over the MSB in Cloud

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Remote sensing has the characteristics of multi-temporal, multi-semantic and multi-spectral, and it plays an important role in most kinds of fields, so we should take some measures to protect the security of the remote sensing. With the rapid development of technology in three-dimensional remote sensing, it has promoted the remote sensing data growth explosively, and it has shown the big data characteristics obviously. Because of the non-complete trusted cloud environment, we consider a security homomorphic encryption scheme over the most significant bit in cloud, which can support the operation for ciphertext remote image in cloud.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sahoo, P.M.: Use of remote sensing for generation of agricultural statistics (2013) Sahoo, P.M.: Use of remote sensing for generation of agricultural statistics (2013)
2.
Zurück zum Zitat Basnyat, P., Teeter, L.D., Lockaby, B.G., et al.: The use of remote sensing and GIS in watershed level analyses of non-point source pollution problems. For. Ecol. Manag. 128(1), 65–73 (2000)CrossRef Basnyat, P., Teeter, L.D., Lockaby, B.G., et al.: The use of remote sensing and GIS in watershed level analyses of non-point source pollution problems. For. Ecol. Manag. 128(1), 65–73 (2000)CrossRef
3.
Zurück zum Zitat Rivest, R., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. In: Foundations of Secure Computation, pp. 169–180 (1978) Rivest, R., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. In: Foundations of Secure Computation, pp. 169–180 (1978)
4.
Zurück zum Zitat Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Mitzenmacher, M. (ed.) STOC, pp. 169–178. ACM (2009) Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Mitzenmacher, M. (ed.) STOC, pp. 169–178. ACM (2009)
5.
Zurück zum Zitat Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphism. Found. Secure Comput. 4(11), 169–180 (1978)MathSciNet Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphism. Found. Secure Comput. 4(11), 169–180 (1978)MathSciNet
8.
Zurück zum Zitat Mohassel, P.. Efficient and Secure Delegation of Linear Algebra. Cryptology ePrint Archive, Report 2011/605 (2011) Mohassel, P.. Efficient and Secure Delegation of Linear Algebra. Cryptology ePrint Archive, Report 2011/605 (2011)
9.
Zurück zum Zitat van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24–43. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13190-5_2 CrossRef van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24–43. Springer, Heidelberg (2010). doi:10.​1007/​978-3-642-13190-5_​2 CrossRef
10.
Zurück zum Zitat Alwen, J., Peikert, C.: Generating shorter bases for hard random lattices. In: STACS, pp. 75–86 (2009) Alwen, J., Peikert, C.: Generating shorter bases for hard random lattices. In: STACS, pp. 75–86 (2009)
11.
Zurück zum Zitat Peng, F., Wang, P., Chen, S.: An improved algorithm of restoring image based on hamming error-correcting codes. J. Image Graph. 13(10), 2043–2046 (2008). (in Chinese) Peng, F., Wang, P., Chen, S.: An improved algorithm of restoring image based on hamming error-correcting codes. J. Image Graph. 13(10), 2043–2046 (2008). (in Chinese)
12.
Zurück zum Zitat Zhang, J., Cox, I.J., Doërr, G.: Steganalysis for LSB matching in images with high-frequency noise. In: IEEE 9th Workshop on Multimedia Signal Processing, 2007. MMSP 2007, pp. 385–388. IEEE (2007) Zhang, J., Cox, I.J., Doërr, G.: Steganalysis for LSB matching in images with high-frequency noise. In: IEEE 9th Workshop on Multimedia Signal Processing, 2007. MMSP 2007, pp. 385–388. IEEE (2007)
13.
Zurück zum Zitat Zhang, F.Y.: Studies on Change Detection Methods for Remote Sensing Images. Xidian University (2010) (in Chinese) Zhang, F.Y.: Studies on Change Detection Methods for Remote Sensing Images. Xidian University (2010) (in Chinese)
14.
Zurück zum Zitat Edward Jr, M.O.: Remote Sensing Imagery-Based Automated Land-Use Change Study. Jilin University (2005) Edward Jr, M.O.: Remote Sensing Imagery-Based Automated Land-Use Change Study. Jilin University (2005)
15.
Zurück zum Zitat Song, J.: Research on Image Encryption Method Based on Chaos and Fractional Fourier Transform. Harbin Institute of Technology (2012) (in Chinese) Song, J.: Research on Image Encryption Method Based on Chaos and Fractional Fourier Transform. Harbin Institute of Technology (2012) (in Chinese)
16.
Zurück zum Zitat Azfar, A., Choo, K.-K.R., Liu, L.: A study of ten popular android mobile VoIP applications: are the communications encrypted? In: Proceedings of 47th Annual Hawaii International Conference on System Sciences (HICSS 2014), pp. 4858–4867 (2014) Azfar, A., Choo, K.-K.R., Liu, L.: A study of ten popular android mobile VoIP applications: are the communications encrypted? In: Proceedings of 47th Annual Hawaii International Conference on System Sciences (HICSS 2014), pp. 4858–4867 (2014)
17.
Zurück zum Zitat Azfar, A., Choo, K.-K.R., Liu, L.: Android mobile VoIP apps: a survey and examination of their security and privacy. Electr. Commerce Res. 16(1), 73–111 (2016)CrossRef Azfar, A., Choo, K.-K.R., Liu, L.: Android mobile VoIP apps: a survey and examination of their security and privacy. Electr. Commerce Res. 16(1), 73–111 (2016)CrossRef
Metadaten
Titel
Security Homomorphic Encryption Scheme Over the MSB in Cloud
verfasst von
Hanbin Zhang
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-67071-3_13