19,412 Hits in 5.2 sec

Multi-User Setting For Dynamic Data Invocation for PrivacyPreserving In Public Cloud Storage

K. Sathish
2014 IOSR Journal of Computer Engineering  
The users should use the cloud storage data as it is local without verifying its integrity and correctness of data.  ...  To securely introduced an effective Intermediate Cloud Accessor (TPA), the auditing processor should bring an new concerns for user data privacy, for that the watermarking for data storage security in  ...  The proposed system specifies that user can access the data on a cloud as if the local one without concern about the integrity of the data.  ... 
doi:10.9790/0661-16463945 fatcat:6mggivzkpfdudavgmdwaymqywa

An Exploration on Privacy Concerned Secured Data Sharing Techniques in Cloud

The main issues associated with cloud service handling are maintaining integrity of data, user management, secured data transmission and so on.  ...  Cloud services needs to be provided with the concern of satisfying user requirements to increase their popularity level.  ...  By using this information cloud stored data contents will be encrypted and will be shared with other users [12] . Thus the privacy requirements of the cloud users can be ensured.  ... 
doi:10.35940/ijitee.a4028.119119 fatcat:32ee7lesjncc7m25hm7spsy7i4

Public Auditing for a Secure Cloud Storage using Dynamic Hash Table

2017 International Journal of Recent Trends in Engineering and Research  
The system efficiently achieves secure auditing for cloud storage with reduced communication overhead and computational cost.  ...  The advantages of using dynamic hash table are excellent updating efficiency. For privacy preservation the proposed system use public key with random masking generated by the third party auditor.  ...  structure dynamic hash table to enable dynamic auditing for cloud storage efficiently and with reduced cost.  For privacy Preservation it uses homomorphic encryption based on public key cryptography and  ... 
doi:10.23883/ijrter.2017.3529.mmycv fatcat:6xftn43skfga3mjm3aowyzrl7u

Framework for a Cloud-Based Multimedia Surveillance System

M. Anwar Hossain
2014 International Journal of Distributed Sensor Networks  
Furthermore, the integration of sensor technology and cloud computing offers new possibilities for efficient development and deployment of sensor-based systems.  ...  The paper finally reports that cloud-based multimedia surveillance system can effectively support the processing overload, storage requirements, ubiquitous access, security, and privacy in large-scale  ...  and privacy, and cloud-based system performance.  ... 
doi:10.1155/2014/135257 fatcat:f7c6chxc7za3rh72m7ru6od7yu

Preserving Privacy and Integrity of Shared Data Stored on Cloud via Tpa

2016 International Journal of Science and Research (IJSR)  
Every time it is not possible for a user to download all data and verify integrity, so in this paper we proposed system named Privacy Preserving And Verification Of Integrity Threat By Tpa Of Shared Data  ...  And also provide the access to data from any location at any time. In cloud computing, data owner host their data on cloud servers and users access that data from cloud server.  ...  System Architecture The proposed scheme uses symmetric encryption which provides confidentiality, integrity, verification with low cost.  ... 
doi:10.21275/v5i2.nov161042 fatcat:ha4t7fusj5a7rduqltewree734

Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey

Abdul Razaque, Mohamed Ben Haj Frej, Bandar Alotaibi, Munif Alotaibi
2021 Electronics  
The TPA, as a trusted party, is responsible for checking the integrity of the CC's data and all the critical information associated with it.  ...  Moreover, TPA's privacy preserving models are comprehensively analyzed and categorized into different classes with an emphasis on their dynamicity.  ...  However, adopting a TPA can come with a price: e.g., trust issues, security concerns, communication and computation costs, and data breaches.  ... 
doi:10.3390/electronics10212721 fatcat:c2ii7g47z5avhgh6nl64gjnjkm

Security Concerns and Remedy in a Cloud Based E-learning System [chapter]

Md. Anwar Hossain Masud, Md. Rafiqul Islam, Jemal Abawajy
2013 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Cloud technology has numerous advantages over the existing traditional e-learning systems. However security is a major concern in cloud based e-learning.  ...  This paper investigates various security issues involved in cloud based e-learning technology with an aim to suggest remedial in the form of security measures and security management standards.  ...  The existing e-learning systems are not dynamically scalable and hard to extend integration with other e-learning systems is very expensive.  ... 
doi:10.1007/978-3-319-04283-1_22 fatcat:bqxylcz4jzdvnhizim4se6bdmm

An extensive research survey on data integrity and deduplication towards privacy in cloud storage

Anil Kumar G., Shantala C. P.
2020 International Journal of Electrical and Computer Engineering (IJECE)  
resistance against all form of dynamic threats over cloud and internet systems.  ...  Therefore, this manuscript discusses the explicit research contribution toward data integrity, data privacy, and data deduplication.  ...  It will mean that the deduplication process in the existing system will only retain privacy to some level at the high computational cost but not the data integrity.  ... 
doi:10.11591/ijece.v10i2.pp2011-2022 fatcat:n4u7snnterbcnltu5re3ey3v2e

Improved Cloud Storage Security Framework Based on TTP Crypto Network

2015 International Journal of Science and Research (IJSR)  
Many users place their data in the cloud, so correctness of data and security is a prime concern.  ...  In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing.  ...  Our audit system, based on novel audit system architecture, can support dynamic data operations and timely abnormal detection with the help of several effective techniques, such as fragment structure,  ... 
doi:10.21275/v4i11.sub159067 fatcat:vsjzkjvqsfdg5f2yantpvj4sky

Privacy Preservation using Shamir's Secrete Sharing Algorithm for Data Storage Security

Tejashree Paigude, Prof. T. A. Chavan
2014 International Journal of Computer Trends and Technology  
simultaneously which reduce communication and computing cost.  ...  Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security.  ...  It uses symmetric encryption which provides confidentiality, integrity, and verification With low cost.  ... 
doi:10.14445/22312803/ijctt-v8p118 fatcat:x25pw5oebfbwzmbnp5netdboyy


2019 Innovare journal of engineering & technology  
Public auditing scheme for secure cloud storage based on dynamic hash table, which is a new two-dimensional data structure located at a third-party auditor (TPA) to record the data property information  ...  In addition, we extend our scheme to support privacy preservation by combining the homomorphic authenticator based on the public key with the random masking generated by the TPA and achieve batch auditing  ...  One of the biggest concerns is how to determine whether a cloud storage system and its provider meet the legal expectations of customers for data security.  ... 
doi:10.22159/ijet.2019.v7i3.19914 fatcat:ao6a3dsiqfa47jdypu3jv257cy


Sanvariya Bhadaniya, Vijay Prakash.
2016 International Journal of Advanced Research  
Acknowledgements:- This research work is self-financed but recommended from the SVITS so as to enhance the sharing of data in a group using single key management by cryptographic techniques.  ...  [2] proposed privacy preserving policy based content sharing in clouds. The main problem in existing system is that how to share the document which is stored in public cloud.  ...  However, with this optimism come also concerns about security.  ... 
doi:10.21474/ijar01/545 fatcat:yjr5ne3ilvhjvecl57qpgohnty

Internet of Cloud: Security and Privacy issues [article]

Allan Cook, Michael Robinson, Mohamed Amine Ferrag, Leandros A. Maglaras, Ying He, Kevin Jones, Helge Janicke
2017 arXiv   pre-print
In this book chapter, we pursue two main goals: 1) to analyse the different components of Cloud computing and the IoT and 2) to present security and privacy problems that these systems face.  ...  We thoroughly investigate current security and privacy preservation solutions that exist in this area, with an eye on the Industrial Internet of Things, discuss open issues and propose future directions  ...  [80] proposed an idea to protect the privacy of image data in content-based Image retrieval outsourcing applications against a curious cloud server and the dishonest query users.  ... 
arXiv:1711.00525v1 fatcat:jlwxjo6jrnbzfjpelriqv6oa5m


Cloud computing offers many services among one is Storage as a service. Using this service user can outsource his data and whenever required he can download or he can share with others.  ...  Using ABE the PHR owner can define access control over his encrypted cloud data. But using ABE dynamic polices over encrypted cloud data is big challenge.  ...  Outsourcing data into the cloud is economically attractive for the cost and complexity of long-term large-scale data storage, it does not offer any guarantee on data integrity and availability.  ... 
doi:10.34218/ijcet.10.1.2019.009 fatcat:7lou2qxkhvduzip7dzdlpqklsa

A Secured Public Auditing Protocol with Dynamic Structure for Cloud Data

Data sharing can be achieved with sensitive information hiding with remote data integrity auditing, propose a new concept called identity based shared data integrity auditing with sensitive information  ...  At present Cloud computing is a very successful paradigm for data computing and storage. It Increases the concerns about data security and privacy in the cloud.  ...  Yu et al. constructed a remote data integrity auditing scheme with perfect data privacy preserving in identity-based cryptosystems.  ... 
doi:10.35940/ijitee.a1019.1191s19 fatcat:lxdc7ufngbhj5hlga23wrbttzm
« Previous Showing results 1 — 15 out of 19,412 results