Filters








1,478 Hits in 7.2 sec

A Review on Secure Storage Using Bidirectional Verification Techniques in Cloud Computing

Mr. Girish kumar d, Dr. Rajashree v biradar, Dr. V c patil
2018 International Journal of Engineering & Technology  
In this paper, advanced survey of the various secured storage in cloud computing using bidirectional protocols is presented.  ...  Security has become one of the major issue in cloud computing which reduces the growth of cloud environment with complications in data privacy and data protection continue to outbreak the market.  ...  This research study discussed the various secured data storage systems in cloud computing. Different protocols adopted for the secured data transmission in cloud is addressed with its advantages.  ... 
doi:10.14419/ijet.v7i4.36.24128 fatcat:xdu3ti32kra35fgd2jllxstcvy

Improved Data Security for Storing and Authenticating in Cloud using ERSA Algorithm

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
This paper presents solution to enhance the security and privacy to stored data in cloud. Result demonstrates that this scheme can progress the security of data that stored in cloud  ...  Auditing will be capability for cloud clients to prove the existence &functioning of their supplier's security measures. Authentication is done by using username and password.  ...  EXISTINGMETHODOLOGIES An Efficient Protocol with Bidirectional Verification The suggested auditing protocol helps dynamic information operations that will be proficient& analyzed to safe in random oracle  ... 
doi:10.35940/ijitee.l1206.10812s19 fatcat:gcpfqfpb6rfjro5xt5q4yyx3ai

Federated Cloud Storage Management Through Provable Data Possession using Dynamic Audit Protocol

2019 International journal of recent technology and engineering  
The proposed system analyse cloud storage and provide free data storage for computing the data and maintain variety of cloud storage in one place.  ...  It facilitates cloud storage for adopting cloud users with the help of cloud service providers.  ...  In this paper, we proposed an easy way of storing and retrieving files from the cloud application with the single user verification.  ... 
doi:10.35940/ijrte.b1122.0782s319 fatcat:imxy5bgizfeyvhridbm7td3okq

Ensuring Security and Privacy Preservation for Cloud Data Services

Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya
2016 ACM Computing Surveys  
We first present security threats and requirements of an outsourcing data service to a cloud, and follow that with a high-level overview of the corresponding security technologies.  ...  With the rapid development of cloud computing, more and more enterprises/individuals are starting to outsource local data to the cloud servers.  ...  Secure Outsourcing Computation and Efficient Revocation in ABE.  ... 
doi:10.1145/2906153 fatcat:c57iz6lswvfxbmhireksha35vm

Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability

Xinpeng Zhang, Chunxiang Xu, Xiaojun Zhang, Taizong Gu, Zhi Geng, Guoping Liu
2016 Information  
With the advent of the big data era, cloud data storage and retrieval have become popular for efficient data management in large companies and organizations, thus they can enjoy the on-demand high-quality  ...  In this paper, we fill this gap by giving a practical efficient revocable privacy-preserving public auditing scheme for cloud storage meeting the auditing requirement of large companies and organization's  ...  Figure 4 . 4 An efficient and security revocable third-party privacy-preserving auditing scheme for cloud storage. Figure 5 . 5 Revocable third-party privacy-preserving auditing protocol.  ... 
doi:10.3390/info7020031 fatcat:syg6mjjelnho3haq6zaonmjomu

FILE SYNCHRONIZATION : TOWARDS AN EFFICIENT FILE SYNCHRONIZATION BETWEEN DIGITAL SAFES

2018 International Journal of Computing Communications and Networking  
WebSocket protocol for the data exchanges improve the efficiency of the synchronization protocol.  ...  The synchronization protocol efficiency raises through the choice of the used networking protocol as well as the strategy of changes detection between two versions of file systems located in different  ...  Server Storage Layer: As introduced in , the Cloud Digital Safe is a standardized architecture that provides a secure environment for storing sensitive document.  ... 
doi:10.30534/ijccn/2018/38722018 fatcat:37govd2h6jawfjtlfwecbjdkci

Secure Cloud based Privacy Preserving DataMinning Platform

S Kumaraswamy, Manjula S H, K R Venugopal
2017 Indonesian Journal of Electrical Engineering and Computer Science  
To address these issues this work present an secure and efficient privacy preserving of mining data on public cloud platform by adopting party and key based authentication strategy.  ...  The adoption of cloud environment for various application uses has led to security and privacy concern of user's data. To protect user data and privacy on such platform is an area of concern.  ...  Their model enables an efficient and low computation model to retrieve resource from cloud database storage environment.  ... 
doi:10.11591/ijeecs.v7.i3.pp830-838 fatcat:c5zerwrg7zdjzizu4typpneixu

Cloud Key Bank: Privacy and Owner Approval Of Required Primary Management Scheme

Aarti Bhoi
2016 International Journal Of Engineering And Computer Science  
In particular, there is a large range from schemes contribution minor security benefits above legacy passwords, to those contribution significant security benefits in appearance for being more costly to  ...  Current access to enforce in grained access control on confidential data presented in the cloud are based on in grained in creation of the data .Current solutions in general information expanding unit  ...  Technical Keywords: ACP, Cloud Computing, Privacy, Encryption. 1.INTRODUCTION Security and privacy show big concerns in the adoption of cloud technologies for data storage.  ... 
doi:10.18535/ijecs/v5i10.34 fatcat:6wjlnyj45zdtdoynpsqxahk5yq

Trusted Framework for Secured Information Storage over Cloud Environment

2015 International Journal of Science and Research (IJSR)  
In this paper, we intend to tackle this problem, specifically for intrusion detection/ prevention and VPN/IPsec as main security mechanisms.  ...  More precisely, we propose a systematic verification approach to check the compliance of security configurations.  ...  Related Work In this section, we present a literature review with respect to intrusion monitoring, and IPsec VPN in cloud computing, with focus on the analysis of security policy consistency, and the verification  ... 
doi:10.21275/v4i11.nov151117 fatcat:cyevatbobveqfczt33bqozyv74

Securing Fog Storage Nodes using an Attribute-based Encryption Scheme and Multi-Factor Authentication

2019 International Journal of Engineering and Advanced Technology  
Fog computing is a non-insignificant augmentation of cloud which comes in to the same security and production difficulties of cloud computing.  ...  In order to evaluate the efficiency, the proposed protocol is implemented and tested in AVISPA and compared with the certificate-based schemes.  ...  The entire process of the storage is carried out in the owncloud, a private cloud storage unit dedicated with 8GB RAM, 1 Tb for storage, 1 Tb for mirroring copy, 8GB RAM and Intel I7 processor for computation  ... 
doi:10.35940/ijeat.f8413.109119 fatcat:m4mlblp775dnjm4vxt4me6yz2i

Reliable Bidirectional Data Transfer Approach for the Internet of Secured Medical Things Using ZigBee Wireless Network

Amjad Rehman, Khalid Haseeb, Suliman Mohamed Fati, Jaime Lloret, Lourdes Peñalver
2021 Applied Sciences  
This work proposed an approach for reliable network supervision with the internet of secured medical things using ZigBee networks for a smart healthcare system (RNM-SC).  ...  Moreover, it also increases security performance in the presence of anomalies and offers data routing using the bidirectional heuristics technique.  ...  Authors are thankful for the support. Conflicts of Interest: Authors declared no conflict of interest.  ... 
doi:10.3390/app11219947 fatcat:duby3jlp7bf5dejmtrsye2lcz4

Implementation of Zero Proof Algorithm for Extended Wireless Body Sensor Networks

Meghna Garg, Manik Gupta
2015 International Journal of Wireless & Mobile Networks  
These devices form the "internet of medical devices "or simply body sensor networks connected with internet backbone.  ...  In this research work we have proposed a machine to machine model of authentication.  ...  ACKNOWLEDGEMENTS I would like to take this opportunity to thank my guide Manik Gupta and my parents for helping me in the research study.  ... 
doi:10.5121/ijwmn.2015.7502 fatcat:32neitnqvjfptj72tail4p5wi4

Research on Linux Trusted Boot Method Based on Reverse Integrity Verification

Chenlin Huang, Chuanwang Hou, Huadong Dai, Yan Ding, Songling Fu, Mengluo Ji
2016 Scientific Programming  
Trusted computing aims to build a trusted computing environment for information systems with the help of secure hardware TPM, which has been proved to be an effective way against network security threats  ...  To solve the problem of lacking trusted hardware in existing computing platform, an alternative security hardware USBKey is introduced in this paper to simulate the basic functions of TPM and a new reverse  ...  mobile computing and cloud computing.  ... 
doi:10.1155/2016/4516596 fatcat:hibiqvpyb5hurakz5hzi2fdqja

Hardware/Software Verification Process through Cloud Computing

Ousama Esbel, Ng Ah Ngan Mike Christian
2016 Lecture Notes on Software Engineering  
This paper proposes a new approach for integrating hardware with software through cloud computing.  ...  For the past decade, we have seen an introduction of hardware/software automated systems in our community, which offer new and interesting advantages to the associated sides.  ...  CLOUD COMPUTING A. Overview In order to shed the light on the pros and cons that Cloud Computing provides to the automated system, we need to understand what Cloud is.  ... 
doi:10.7763/lnse.2016.v4.236 fatcat:lm4amcjsnbcqhgjs7nav2pebzq

Secure and Efficient Proof of Ownership Scheme for Client-Side Deduplication in Cloud Environments

Amer Al-Amer, Osama Ouda
2021 International Journal of Advanced Computer Science and Applications  
This paper proposes a secure and efficient PoW scheme for client-side deduplication in cloud environments with minimal computational overhead.  ...  Data deduplication is an effective mechanism that reduces the required storage space of cloud storage servers by avoiding storing several copies of the same data.  ...  ACKNOWLEDGMENT The authors would like to thank the Deanship of Graduate Studies at Jouf University for funding and supporting this research through the initiative of DGS, Graduate Students Research Support  ... 
doi:10.14569/ijacsa.2021.01212111 fatcat:osknhexwirbspf4ot3voenm3xa
« Previous Showing results 1 — 15 out of 1,478 results