Filters








5,135 Hits in 3.1 sec

Composable and Robust Outsourced Storage [chapter]

Christian Badertscher, Ueli Maurer
2018 Lecture Notes in Computer Science  
We present a novel and composable denition for secure and robust outsourcing schemes.  ...  As part of our study, we develop an audit mechanism, based on secure and robust outsourcing schemes, that is similar to the construction by Cash et al.  ...  A novel notion for secure and robust outsourcing schemes.  ... 
doi:10.1007/978-3-319-76953-0_19 fatcat:63jfz3cl45dgbfevwildllxrk4

Robust dynamic remote data checking for public clouds

Bo Chen, Reza Curtmola
2012 Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12  
In this paper, we propose the first RDC schemes that provide robustness and, at the same time, support dynamic updates, while requiring small, constant, client storage.  ...  Robustness is required for both static and dynamic RDC schemes that rely on spot checking for efficiency.  ...  The data owner deletes F and Σ from its local storage and only keeps a small amount of secret key material K (constant client storage).  ... 
doi:10.1145/2382196.2382319 dblp:conf/ccs/ChenC12 fatcat:gzfbrctzq5fvri3cuaz5fpzeay

DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security

Mazhar Ali, Kashif Bilal, Samee U. Khan, Bharadwaj Veeravalli, Keqin Li, Albert Y. Zomaya
2018 IEEE Transactions on Cloud Computing  
Outsourcing data can be lead many security problems in cloud storage. So implement privacy preserving data storage using DROPS based access control mechanism.  ...  Prevent data storage from unauthorized access.  ...  Jungle Disk [7] and Cumulus [21] are proposed to protect the privacy of outsourced data, and their implementation use Amazon S3 [2] as the storage backend.  ... 
doi:10.1109/tcc.2015.2400460 fatcat:ahmsyzyoy5cudcump3rxiwnppa

Robust, Revocable and Adaptively Secure Attribute-Based Access Control with Outsourced Decryption [article]

Anis Bkakria
2022 IACR Cryptology ePrint Archive  
In this paper, we propose the first single-point-of-failure free multi-authority ciphertext-policy ABE that simultaneously (1) ensures robustness for both decryption key issuing and access revocation while  ...  achieving forward secrecy; (2) enables outsourced decryption to reduce the decryption overhead for data users that have limited computational resources; and (3) achieves adaptive (full) security in standard  ...  -Cloud storage provider (CSP) is responsible of providing data storage and computation capabilities, e.g., outsourced decryption and ciphertext re-encryption.  ... 
dblp:journals/iacr/Bkakria22 fatcat:famf6dzlrbeata6shqxhp25fr4

Cloud Computing: Future Generation Computing Systemsas the 5th Utility

Alok Vishwakarma
2012 International Journal of Information and Electronics Engineering  
Cloud computing is the emerging computing platform by providing the computing utilities as service such as platform, software and storage.  ...  electricity, telephony, gas, and water.  ...  As a consequence, a huge number of services will be available in the cloud and these services will be composed into new services.  ... 
doi:10.7763/ijiee.2012.v2.80 fatcat:qap2yg3blnhjveot65evi3gzpa

2013 Annual Index

2014 IEEE Transactions on Services Computing  
The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination.  ...  The Subject Index contains entries describing the item under all appropriate subject headings, plus the first author's name, the publication abbreviation, month, and year, and inclusive pages.  ...  Kokash, Natallia, +, TSC April-June 2013 186-200 Information storage Dynamic Audit Services for Outsourced Storages in Clouds.  ... 
doi:10.1109/tsc.2014.5 fatcat:hagb3a6lhbae5kazafxvqcwxl4

A Solution for Privacy-Preserving Data Manipulation and Query on NoSQL Database

Yubin Guo, Liankuan Zhang, Fengren Lin, Ximing Li
2013 Journal of Computers  
Storage and indexing structure on NoSQL database, query protocol are proposed, and algorithms for updating and querying are also given.  ...  In this paper, a solution of data storage and query protocol based on classical homomorphic encryption scheme is given to preserve privacy of both data owners and query users.  ...  Berkeley DB is a robust solution on which to build a NoSQL system, and the storage system of its key/value pair is more efficient than other database.  ... 
doi:10.4304/jcp.8.6.1427-1432 fatcat:i4gcfczvtjacbisj4ilxajvulm

Security Mechanisms Planning to Enforce Security Policies [chapter]

Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard
2016 Lecture Notes in Computer Science  
This paper presents an approach allowing for a given security and utility requirements, the selection of a combination of mechanisms and the way it will be applied to enforce them.  ...  To achieve this goal, we firstly use an expressive formal language to specify the security and utility properties required by data owners and the security mechanisms that can be used to enforce them.  ...  under a collaborative Cloud storage service providers model.  ... 
doi:10.1007/978-3-319-30303-1_6 fatcat:lixegu72nvcl5jesxzj3gsesf4

Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage

Walid I. Khedr, Heba M. Khater, Ehab R. Mohamed
2019 IEEE Access  
A PDP scheme allows data owners to efficiently, periodically, and securely verify that a cloud storage provider possesses the outsourced data.  ...  However, public cloud storage services are not optimal for ensuring the possession and integrity of the outsourced data, a situation that has given rise to many proposed provable data possession check  ...  It is composed of two phases: a setup phase and a proof generation-verification phase (PGV). 1) SETUP PHASE This phase is a one-time operation executed by the data owner C before outsourcing the data  ... 
doi:10.1109/access.2019.2917628 fatcat:yiuz3fnlnzcnjjvnvgrubwfcry

Identity Broadcast Virtual Proxy for Centralized Cloud Server

Roshitha P P, Sneha T Subramanian, T Sivakumar
2017 International Journal of Engineering Research and  
Online storing and retrieving data in third party's cloud system causes serious conflict over data security and data confidentiality during the data transactions.  ...  A secured distributed storage system is formulated using a secured threshold proxy re-encryption server that integrates with a decentralized erasure code.  ...  Multiple users can interact with the storage system. The distributed storage system supports secure and robust data storage and retrieval.  ... 
doi:10.17577/ijertv6is050243 fatcat:r37dmypsxrfspbaymtrjntpcz4

Secure Outsourcing and Sharing of Cloud Data using a User-side Encrypted File System

Osama A. Khashan
2020 IEEE Access  
robust encryption algorithms and strong encryption keys.  ...  The common approach is composed of a client application that interacts with the local cryptographic file system, and the encrypted data are synchronized or backup to connected back-end cloud storage servers  ... 
doi:10.1109/access.2020.3039163 fatcat:o2r5teldkbcxfibmx4ef5wlj5a

FADE: Secure Overlay Cloud Storage with File Assured Deletion [chapter]

Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman
2010 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
While we can now outsource data backup to third-party cloud storage services so as to reduce data management costs, security concerns arise in terms of ensuring the privacy and integrity of outsourced  ...  FADE is built upon standard cryptographic techniques, such that it encrypts outsourced data files to guarantee their privacy and integrity, and most importantly, assuredly deletes files to make them unrecoverable  ...  Participants in the System Our system is composed of three participants: the data owner, the key manager, and the storage cloud. They are described as follows. Data owner.  ... 
doi:10.1007/978-3-642-16161-2_22 fatcat:zgagc67lsfhrviiglxgatgkaxe

Erasure Codes-Based Storage-Aware Protocol For Preserving Cloud Data Under Correlation Failures

Zhiqiang Ruan, Zhi Li
2015 International Journal of Grid and Distributed Computing  
The proposed protocol benefits from several key features such as less storage cost, competitive communication cost, and much better data robustness comparing to the state of the art distributed storage  ...  Distributed storage of cloud data imposes a great challenge for assuring data availability and reliability in the face of stochastic failures and attacks.  ...  user data outsourcing service, data retrieval, and repair service.  ... 
doi:10.14257/ijgdc.2015.8.2.11 fatcat:awzemlpzc5gurkilztwbqutd44

Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption

Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, José M. Fernandez, David Gross-Amblard
2013 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
Database outsourcing in which organizations outsource the storage and management of their collected data to third party service providers offers a way for these organizations to reduce the cost of controlling  ...  It is composed of three main components: • Users: They are actually database clients who have permission to query outsourced data.  ... 
doi:10.22667/jowua.2013.06.31.039 dblp:journals/jowua/BkakriaCCFG13 fatcat:tpqcilpnffaljcpwsmldcflvz4

A comprehensive architecture for an IoRT-aware Business Process outsourcing into Fog and Cloud computing

Najla Fattouch, Imen Ben Lahmar, Khouloud Boukadi
2021 Tunisian-Algerian Joint Conference on Applied Computing  
Nonetheless, outsourcing an IoRT-aware BP to the Fog and Cloud is not a trivial task due to the diversity of the tasks requirements, the capacities of Fog/ Cloud devices, and the outsourcing techniques  ...  In this setting, the business managers seek to outsource their IoRT-aware BPs to the Fog and Cloud paradigms.  ...  The PSO knew an increased use thanks to its advantages such as its simplicity, robustness, and effectiveness. [26] .  ... 
dblp:conf/tacc/FattouchLB21 fatcat:ed7b2kffmbbtpehwmxg4zatpia
« Previous Showing results 1 — 15 out of 5,135 results