Chaos-based Encryption Keys and Neural Key-store for Cloud-hosted Data Confidentiality

N.N. Mosola, M.T. Dlamini, Jonathan Blackledge, J.H.P. Eloff, H.S. Venter

Research output: Contribution to conferencePaperpeer-review

Abstract

Cloud computing brings flexible and cost-effective services. However, security concerns plague the cloud. Data confidentiality is one of the security concerns inhibiting the adoption of cloud computing. This concern stems from various cyberattacks directed towards gaining unauthorised access to cloud-bound or cloud-hosted data. This paper proposes a clientend encryption and key management system to curb cyberattacks that target compromising data confidentiality on the cloud.
Original languageEnglish
DOIs
Publication statusPublished - 2017
Externally publishedYes
EventSouthern Africa Telecommunication Networks and Applications Conference - Royal Caribbean International
Duration: 3 Sep 201710 Sep 2017

Conference

ConferenceSouthern Africa Telecommunication Networks and Applications Conference
CityRoyal Caribbean International
Period3/09/1710/09/17
OtherSATNAC, 2017

Keywords

  • Cloud computing
  • security
  • data confidentiality
  • cyberattacks
  • encryption
  • key management

Fingerprint

Dive into the research topics of 'Chaos-based Encryption Keys and Neural Key-store for Cloud-hosted Data Confidentiality'. Together they form a unique fingerprint.

Cite this