A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Multi-User Setting For Dynamic Data Invocation for PrivacyPreserving In Public Cloud Storage
2014
IOSR Journal of Computer Engineering
The users should use the cloud storage data as it is local without verifying its integrity and correctness of data. ...
To securely introduced an effective Intermediate Cloud Accessor (TPA), the auditing processor should bring an new concerns for user data privacy, for that the watermarking for data storage security in ...
The proposed system specifies that user can access the data on a cloud as if the local one without concern about the integrity of the data. ...
doi:10.9790/0661-16463945
fatcat:6mggivzkpfdudavgmdwaymqywa
An Exploration on Privacy Concerned Secured Data Sharing Techniques in Cloud
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
The main issues associated with cloud service handling are maintaining integrity of data, user management, secured data transmission and so on. ...
Cloud services needs to be provided with the concern of satisfying user requirements to increase their popularity level. ...
By using this information cloud stored data contents will be encrypted and will be shared with other users [12] . Thus the privacy requirements of the cloud users can be ensured. ...
doi:10.35940/ijitee.a4028.119119
fatcat:32ee7lesjncc7m25hm7spsy7i4
Public Auditing for a Secure Cloud Storage using Dynamic Hash Table
2017
International Journal of Recent Trends in Engineering and Research
The system efficiently achieves secure auditing for cloud storage with reduced communication overhead and computational cost. ...
The advantages of using dynamic hash table are excellent updating efficiency. For privacy preservation the proposed system use public key with random masking generated by the third party auditor. ...
structure dynamic hash table to enable dynamic auditing for cloud storage efficiently and with reduced cost. For privacy Preservation it uses homomorphic encryption based on public key cryptography and ...
doi:10.23883/ijrter.2017.3529.mmycv
fatcat:6xftn43skfga3mjm3aowyzrl7u
Framework for a Cloud-Based Multimedia Surveillance System
2014
International Journal of Distributed Sensor Networks
Furthermore, the integration of sensor technology and cloud computing offers new possibilities for efficient development and deployment of sensor-based systems. ...
The paper finally reports that cloud-based multimedia surveillance system can effectively support the processing overload, storage requirements, ubiquitous access, security, and privacy in large-scale ...
and privacy, and cloud-based system performance. ...
doi:10.1155/2014/135257
fatcat:f7c6chxc7za3rh72m7ru6od7yu
Preserving Privacy and Integrity of Shared Data Stored on Cloud via Tpa
2016
International Journal of Science and Research (IJSR)
Every time it is not possible for a user to download all data and verify integrity, so in this paper we proposed system named Privacy Preserving And Verification Of Integrity Threat By Tpa Of Shared Data ...
And also provide the access to data from any location at any time. In cloud computing, data owner host their data on cloud servers and users access that data from cloud server. ...
System Architecture The proposed scheme uses symmetric encryption which provides confidentiality, integrity, verification with low cost. ...
doi:10.21275/v5i2.nov161042
fatcat:ha4t7fusj5a7rduqltewree734
Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey
2021
Electronics
The TPA, as a trusted party, is responsible for checking the integrity of the CC's data and all the critical information associated with it. ...
Moreover, TPA's privacy preserving models are comprehensively analyzed and categorized into different classes with an emphasis on their dynamicity. ...
However, adopting a TPA can come with a price: e.g., trust issues, security concerns, communication and computation costs, and data breaches. ...
doi:10.3390/electronics10212721
fatcat:c2ii7g47z5avhgh6nl64gjnjkm
Security Concerns and Remedy in a Cloud Based E-learning System
[chapter]
2013
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Cloud technology has numerous advantages over the existing traditional e-learning systems. However security is a major concern in cloud based e-learning. ...
This paper investigates various security issues involved in cloud based e-learning technology with an aim to suggest remedial in the form of security measures and security management standards. ...
The existing e-learning systems are not dynamically scalable and hard to extend integration with other e-learning systems is very expensive. ...
doi:10.1007/978-3-319-04283-1_22
fatcat:bqxylcz4jzdvnhizim4se6bdmm
An extensive research survey on data integrity and deduplication towards privacy in cloud storage
2020
International Journal of Electrical and Computer Engineering (IJECE)
resistance against all form of dynamic threats over cloud and internet systems. ...
Therefore, this manuscript discusses the explicit research contribution toward data integrity, data privacy, and data deduplication. ...
It will mean that the deduplication process in the existing system will only retain privacy to some level at the high computational cost but not the data integrity. ...
doi:10.11591/ijece.v10i2.pp2011-2022
fatcat:n4u7snnterbcnltu5re3ey3v2e
Improved Cloud Storage Security Framework Based on TTP Crypto Network
2015
International Journal of Science and Research (IJSR)
Many users place their data in the cloud, so correctness of data and security is a prime concern. ...
In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. ...
Our audit system, based on novel audit system architecture, can support dynamic data operations and timely abnormal detection with the help of several effective techniques, such as fragment structure, ...
doi:10.21275/v4i11.sub159067
fatcat:vsjzkjvqsfdg5f2yantpvj4sky
Privacy Preservation using Shamir's Secrete Sharing Algorithm for Data Storage Security
English
2014
International Journal of Computer Trends and Technology
English
simultaneously which reduce communication and computing cost. ...
Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security. ...
It uses symmetric encryption which provides confidentiality, integrity, and verification With low cost. ...
doi:10.14445/22312803/ijctt-v8p118
fatcat:x25pw5oebfbwzmbnp5netdboyy
ACTIVE-HASH-TABLE BASED PUBLIC AUDITING FOR SECURE CLOUD STORAGE
2019
Innovare journal of engineering & technology
Public auditing scheme for secure cloud storage based on dynamic hash table, which is a new two-dimensional data structure located at a third-party auditor (TPA) to record the data property information ...
In addition, we extend our scheme to support privacy preservation by combining the homomorphic authenticator based on the public key with the random masking generated by the TPA and achieve batch auditing ...
One of the biggest concerns is how to determine whether a cloud storage system and its provider meet the legal expectations of customers for data security. ...
doi:10.22159/ijet.2019.v7i3.19914
fatcat:ao6a3dsiqfa47jdypu3jv257cy
A GROUP SHARING SCHEME BY EFFICIENT SINGLE KEY MANAGEMENT USING CRYPTOGRAPHIC TECHNIQUE
2016
International Journal of Advanced Research
Acknowledgements:- This research work is self-financed but recommended from the SVITS so as to enhance the sharing of data in a group using single key management by cryptographic techniques. ...
[2] proposed privacy preserving policy based content sharing in clouds. The main problem in existing system is that how to share the document which is stored in public cloud. ...
However, with this optimism come also concerns about security. ...
doi:10.21474/ijar01/545
fatcat:yjr5ne3ilvhjvecl57qpgohnty
Internet of Cloud: Security and Privacy issues
[article]
2017
arXiv
pre-print
In this book chapter, we pursue two main goals: 1) to analyse the different components of Cloud computing and the IoT and 2) to present security and privacy problems that these systems face. ...
We thoroughly investigate current security and privacy preservation solutions that exist in this area, with an eye on the Industrial Internet of Things, discuss open issues and propose future directions ...
[80] proposed an idea to protect the privacy of image data in content-based Image retrieval outsourcing applications against a curious cloud server and the dishonest query users. ...
arXiv:1711.00525v1
fatcat:jlwxjo6jrnbzfjpelriqv6oa5m
EXPERIMENTAL STUDY ON CLOUD SECURITY FOR PERSONAL HEALTH RECORDS OVER PATIENT CENTRIC DATA
2019
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY
Cloud computing offers many services among one is Storage as a service. Using this service user can outsource his data and whenever required he can download or he can share with others. ...
Using ABE the PHR owner can define access control over his encrypted cloud data. But using ABE dynamic polices over encrypted cloud data is big challenge. ...
Outsourcing data into the cloud is economically attractive for the cost and complexity of long-term large-scale data storage, it does not offer any guarantee on data integrity and availability. ...
doi:10.34218/ijcet.10.1.2019.009
fatcat:7lou2qxkhvduzip7dzdlpqklsa
A Secured Public Auditing Protocol with Dynamic Structure for Cloud Data
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Data sharing can be achieved with sensitive information hiding with remote data integrity auditing, propose a new concept called identity based shared data integrity auditing with sensitive information ...
At present Cloud computing is a very successful paradigm for data computing and storage. It Increases the concerns about data security and privacy in the cloud. ...
Yu et al. constructed a remote data integrity auditing scheme with perfect data privacy preserving in identity-based cryptosystems. ...
doi:10.35940/ijitee.a1019.1191s19
fatcat:lxdc7ufngbhj5hlga23wrbttzm
« Previous
Showing results 1 — 15 out of 19,412 results