Data Privacy Over Cloud Computing using Multi Party Computation

A. Vijaya Kumar, Koppu Monica, Krishnaveni Mandadi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

As a result of the development of several industries and the constant advancement of technology and inventions, as is well known, enormous volumes of data are produced on a daily basis. Every day, more data is produced as a result of progress, and maintaining these enormous volumes of data is a difficult work because they contain many secret informational items that must be kept secure as part of business secrecy. Furthermore, not all data generated will be useful. Therefore, screening data is a crucial duty. Many small-scale firms believe that all of this data preservation is an expensive endeavor that is only feasible for large industries, but the procedure is also crucial to efficient way.

Original languageEnglish
Title of host publicationIDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things, Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages262-267
Number of pages6
ISBN (Electronic)9781665474511
DOIs
StatePublished - 2023
Externally publishedYes
Event2023 International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2023 - Bengaluru, India
Duration: Jan 5 2023Jan 7 2023

Publication series

NameIDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things, Proceedings

Conference

Conference2023 International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2023
Country/TerritoryIndia
CityBengaluru
Period01/5/2301/7/23

Keywords

  • Cryptography
  • Data Mining
  • Data Security
  • Decryption
  • Encryption
  • Symmetric key block

Fingerprint

Dive into the research topics of 'Data Privacy Over Cloud Computing using Multi Party Computation'. Together they form a unique fingerprint.

Cite this