Several public-key encryption schemes used to solve the problem of ciphertext data processing on the fly are discussed.A new targeted fully homomorphic encrypti
Network security requirements based on virtual network technologies in IaaS platforms and corresponding solutions were reviewed.A dynamic network security archi