An Innovative Encryption Method for Agriculture Intelligent Information System based on Cloud Computing Platform

  title={An Innovative Encryption Method for Agriculture Intelligent Information System based on Cloud Computing Platform},
  author={Wenxue Tan and Chunjiang Zhao and Huarui Wu and Xiping Wang},
  journal={J. Softw.},
Along with a rapid growth of cloud computing technology and its deep application in Agriculture Intelligent Information System, Agriculture Industry information security and privacy has become a highlight of the issue about Agriculture Cloud Information System. Encrypting is a conventional information security means, however, hitherto almost all encryption scheme cannot support the operation based on cipher-text. As a result, it is a difficult to build up the corporate and individual… Expand
Network Data Encryption Strategy for Cloud Computing
  • Chang Xue-zhou
  • Computer Science
  • 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation
  • 2015
Experiments show that improvement program technology not only ensures the message security of the transmission and the security distribution of keys, but also it doesn't reduce the efficiency of encryption and decryption data. Expand
An Efficient Anomaly Detection Framework for Cloud Computing Environment
Experimental results show that the proposed framework is better than other anomaly detection methods designed for cloud computing environment in terms of precision, recall, false alarm rate, and runtime. Expand
Design of a deep water cage culture environment monitoring system based on ZigBee
With the development of deep water cage culture digital management technology and accurate cultivation techniques, monitoring the overall deep water cage culture environment has become extremelyExpand
Design of a deep water cage culture environment monitoring system based on ZigBee
This system achieves accurate monitoring of the deep water cage culture environment, and also solves field cabling and low efficiency problems. Expand
Image Segmentation Based on Color Feature
A new fuzzy color image segmentation algorithm was brought out based on feature divergence and fuzzy dissimilarity, and the isolated points were eliminated, and made color images segmentation more according with the human segmentation strategy. Expand
Survey on Test Case Prioritization Techniques for Regression Testing
The major findings in this survey are that test case prioritization is still at its primitive stages and more research is required to make it applicable in today’s world. Expand
Coverage Criteria for State-Based Testing: A Systematic Review
A number of coverage criteria at the design level are discuses to find out various types of state-based faults in SBT. Expand


Privacy-Preserving Computable Encryption Scheme of Cloud Computing
  • H. Ru
  • Computer Science
  • 2011
Through a variety of vector and matrix operations, CESVMC realizes the encryption of data, and supports fuzzy string search and basic arithmetic calculations on encrypted data. Expand
Design and Analysis of a Provable Secure Multi-Recipient Public Key Encryption Scheme
Analyses show that the proposed scheme is a efficient and secure public-key encryption scheme, in which, a ciphertext encrypted by an encryption key can be decrypted by a number of decryption keys, which makes it play an important role in many applications. Expand
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing
The characteristics of cloud computing are investigated and an efficient privacy preserving keyword search scheme in cloud computing is proposed that allows a service provider to participate in partial decipherment to reduce a client's computational overhead and enables the service providers to search the keywords on encrypted files to protect the user data privacy and the user queries privacy efficiently. Expand
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
A new encryption scheme which is secure against adaptive chosen-ciphertext attack (or CCA2-secure) in the standard model (i.e., without the use of random oracle) is presented and it is shown that security holds also if the authors use projective hash families (as the original Cramer–Shoup) and under the weaker Computational Diffie–Hellman (CDH) Assumption. Expand
A RSA Key Security Gradating Algorithm Based on Threshold Attack Time
It is pointed out that if key-pair is properly chosen RSA system can acquire a satisfying immunity from Iterative- Encrypting-Attack, and that the case can be improved if the traditional key generation algorithm is modified delicately. Expand
Public Key Encryption with Keyword Search
This work defines and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email. Expand
Research and implement of a voice encryption method in the trunking communication
Trunking communication in the field of mobile communication was an integral part, and voice encryption was its core technology.The voice data encrypted was presented by different terminals whichExpand
A Novel Practical Certificate-Less Digital Signing System Based on Super-Elliptic Bilinear Map Parings
In this paper, we propose a novel practical Certificate-Less digital signing system based on bilinear map pairings defined on super elliptic curve, which is proved more efficiency than some similarExpand
Developing a New Wireless Sensor Network Platform and Its Application in Precision Agriculture
This work evaluates a new wireless sensor network platform and its application in precision agriculture, including its embedded operating system and its routing algorithm, which incorporates a modified version of LORA-CBF, a wireless location-based routing algorithm that uses cluster-based flooding. Expand
Secure and efficient access to outsourced data
This paper proposes to encrypt every data block with a different key so that flexible cryptography-based access control can be achieved, and investigates the overhead and safety of the proposed approach, and study mechanisms to improve data access efficiency. Expand