What is it about?
This article has proposed an algorithm whose execution time is not dependent on data size as has been identified in other state of the art algorithms but dependent on the secret key generated. This makes NCS a non-deterministic scheme making it difficult for any hacker to predict the trend of the execution time.
Featured Image
Photo by Markus Spiske on Unsplash
Why is it important?
This is to make it difficult for any hacker to predict the execution time of any data to be transferred to the cloud as a result ensuring the confidentiality and privacy of data. This also helps to reduce tear and wear of devices at the client side and the providers end.
Perspectives
Read the Original
This page is a summary of: Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme, PLoS ONE, February 2023, PLOS,
DOI: 10.1371/journal.pone.0274628.
You can read the full text:
Resources
Contributors
The following have contributed to this page