Several public-key encryption schemes used to solve the problem of ciphertext data processing on the fly are discussed.A new targeted fully homomorphic encrypti
Network security requirements based on virtual network technologies in IaaS platforms and corresponding solutions were reviewed.A dynamic network security archi
Malicious applications can be introduced to attack users and services so as to gain financial rewards,individuals’sensitive information,company and government