Browse > Article
http://dx.doi.org/10.6109/jkiice.2012.16.10.2217

Design of Configuration Management using Homomorphic Encryption in Mobile Cloud Service  

Kim, Sun-Joo (한국정보통신기술협회)
Kim, Jin-Mook (선문대학교 IT교육학부)
Jo, In-June (배재대학교 컴퓨터공학과)
Abstract
As smartphone users are over 20 million, companies, which offer cloud computing services, try to support various mobile devices. If so, users can use the same cloud computing service using mobile devices, as sharing document. When user share the work, there are problem in configuration management, data confidentiality and integrity. In this paper, we propose a method that cloud computing users share document efficiently, edit encrypted docuements, and manage configuration based on homomorphic encryption, which integrity is verifiable.
Keywords
Mobil Cloud Service; Homomorphic Encryption; Configuration Management;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 정지범, "모바일 클라우드 시장 동향 및 시사점" 정보처리학회지, 18(5) pp. 4-10, 2011년 9월.
2 조남수, 장구영, " Homomorphic Encryption의 기술 동향 및 전망", pp.15-25, 정보통신산업진흥원 주간기술동향. 2011.11.18
3 송유진, 박광용, "데이터베이스 아웃소싱을 위한 준동형성 암호기술," 19(3) pp. 80-89, 2009년도 정보보호학회지, 2009.06.
4 Rivest, Adleman, Dertouzos, "On data bank and privacy homomorphisms", pp169-180, Proceedings of the 19th Annual Symposium on Foundations of Secure Computation-FSC 1978, Academic Press
5 J.Domingo-Ferrer, "A New privacy homo -morphism and applications", vol. 60, no.5, pp. 277-282, Information Processing letters, Dec. 1996.   DOI   ScienceOn
6 Craig Gentry, "Fully homomorphic encryption using ideal lattices", pp.169-178, in Proceedings of the 41st ACM Symposium on Theory of Computing - STOC 2009, ACM, 2009.05
7 TTA 용어사전, http://word.tta.or.kr
8 Pascal Paillier, "Public-key cryptosystems based on composite degree residuosity classes", 1999.5, 99.223-238, 1999. LNCS vol.1592 Advanced in Cryptology-Eurocrypt