8,387 Hits in 4.5 sec


2011 Proceedings of the 1st International Conference on Cloud Computing and Services Science   unpublished
In some applications, in which all processing takes place at the client side and the Cloud simply handles data storage (e.g. Google Docs), on-line data encryption/decryption guarantees privacy.  ...  Cloud security comprises access control and end-to-end security based on flow or message-level privacy.  ...  -00010) of the CONSOLIDER-INGENIO 2010 Program; and by the Spanish Ministry of Science and Innovation FPU grant AP2006-02580.  ... 
doi:10.5220/0003380905910596 fatcat:y6khdyilqzbhtazhf7qatwk6p4


In this paper for achieving grant and revoke privileges over encrypted data Timestamp server is introduced.  ...  In order to provide security for owner health records ABE (attribute-based encryption) is best suitable for other encryption techniques.  ...  to privacy he conjointly encrypts the keywords and he can transfer to the cloud.  ... 
doi:10.34218/ijcet.10.1.2019.009 fatcat:7lou2qxkhvduzip7dzdlpqklsa

Privacy-enabled remote health monitoring applications for resource constrained wearable devices

Davy Preuveneers, Wouter Joosen
2016 Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC '16  
In this paper, we present and evaluate a practical smartwatch based lifelog application for diabetics that leverages the cloud and homomorphic encryption for caregivers to analyze blood glucose, insulin  ...  Although these technologies can significantly complement resource constrained mobile and wearable devices to store and process personal health information, privacy concerns are keeping patients from reaping  ...  Acknowledgment This research is partially funded by the Research Fund KU Leuven and the ICON funding programme of iMinds.  ... 
doi:10.1145/2851613.2851683 dblp:conf/sac/PreuveneersJ16 fatcat:ezzie76u4vdszcv2itzpdzvlim

Improved Privacy Preserving Through Random Pixel Shifting Method RPSM in Cloud

Rahul Kumar Dangarh, Prof. Arun Jhapate
2018 International Journal of Trend in Scientific Research and Development  
In this method perform image encryption and decryption technique that is based prime number key. This proposed method use random pixel shifting method for image encryption.  ...  The proposed novel approach shows better result as compare other method in terms of encryption and decryption of secure image.  ...  Data utilization practice deteriorates users' personal privacy and it increases the legislation pressures and criticism.  ... 
doi:10.31142/ijtsrd18788 fatcat:sgit3g2b7rfjfg44xawuzb2t2y

Private VNFs for collaborative multi-operator service delivery: An architectural case

Gergely Biczok, Balazs Sonkoly, Nikolett Bereczky, Colin Boyd
2016 NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium  
Specifically, we show the promise of homomorphic encryption (HE) in this context and its performance limitations through a proof of concept implementation of an image transcoder network function.  ...  Owing to the (partial lack of) contractual relationships and co-opetition in the ecosystem, the privacy of user data, operator policy and even VNF code could be compromised.  ...  Of these, homomorphic encryption is the appropriate choice when private data is sent to the cloud for processing and should be returned to users for decrypting after processing has taken place.  ... 
doi:10.1109/noms.2016.7502996 dblp:conf/noms/BiczokSBB16 fatcat:x42zasxsdbfibkplqa4s7z5lsu

A Bigdata Process for Practical Privacy-Preserving Utilizing k-Means Clustering

2019 International Journal of Engineering and Advanced Technology  
To overcome such security issues cryptographic concepts have been used in this paper to provide high security of big data's with the low consumption of time for both encryption and decryption process.  ...  Now a day's privacy preservation is the big issue on growing big data in various field such as medical, engineering and physical with the fast growing network.  ...  But this DPQR handles only Boolean data and not found suitable for numerical and other types of data. Zhu et al., (2016) proposed a practical privacy preserving frame work called eDiag.  ... 
doi:10.35940/ijeat.b4085.129219 fatcat:gfn3raadqvfgnfaredmjhuk5km

Identity management in GRID computing and Service Oriented Architectures: research and practice

Theodora Varvarigou, Vassiliki Andronikou
2009 Identity in the Information Society  
Within this context, security and privacy requirements have become of great importance, as well the need for flexible and efficient identity management.  ...  Today, Service-Oriented Architecture (SOA) and Grid and Cloud computing comprise the key technologies in distributed systems.  ...  the original author(s) and source are credited.  ... 
doi:10.1007/s12394-010-0040-4 fatcat:j7xuusvm2bc2hanf4rkeayyanm

Federated Transfer Learning: concept and applications [article]

Sudipan Saha, Tahir Ahmad
2021 arXiv   pre-print
In more details, we study the background of FTL and its different existing applications. We further analyze FTL from privacy and machine learning perspective.  ...  Among different variants of the federated learning, noteworthy is federated transfer learning (FTL) that allows knowledge to be transferred across domains that do not have many overlapping features and  ...  In this work, we analyzed the concept of FTL and its applications in several practical domains. Furthermore, we did a detailed review of the machine learning techniques used in FTL.  ... 
arXiv:2010.15561v3 fatcat:3udixrhta5btlb7w7r4fomwpzu

Securing the e-health cloud

Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
2010 Proceedings of the ACM international conference on Health informatics - IHI '10  
To fill this gap, we present a security architecture for establishing privacy domains in e-health infrastructures.  ...  Moreover, we discuss further open problems and research challenges on security, privacy and usability of e-health cloud systems.  ...  ., cloud computing) and other services (e.g., billing processing and accounting for medical practices) leads to a complex system where privacy-sensitive data are stored and processed at many different  ... 
doi:10.1145/1882992.1883024 dblp:conf/ihi/LohrSW10 fatcat:wllmswats5enzihifeuhim2onu

Survey on Homomorphic Encryption and Address of New Trend

Ayman Alharbi, Haneen Zamzami, Eman Samkri
2020 International Journal of Advanced Computer Science and Applications  
This article aims to introduce a literature survey to close the gap in homomorphic encryption systems and their applications in the protection of privacy.  ...  Homomorphic encryption is one of the most important encryption-related processes which allows performing operation over encrypted data.  ...  Finally more work is needed to apply the concept of homomorphic encryption for cloud environment.  ... 
doi:10.14569/ijacsa.2020.0110774 fatcat:f27kc4abbbbmddnjmwlz3ijmyu

Identity Management in Cloud Computing

Rizwana Shaikh, M. Sasikumar
2013 International Journal of Computer Applications  
The various security issues are attracting attention, one of which is identity and privacy of the cloud user.  ...  We present an analysis of various identity management systems and proposing a simple trust based scheme for a cloud computing application and service.  ...  The concept of virtual reality is used for privacy and to minimize the impact of data breaches.  ... 
doi:10.5120/10509-5467 fatcat:qbui7ui4erevldbiwb5sngro6q

Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions

Pan Jun Sun
2019 IEEE Access  
First, we discuss the architecture, concepts and several shortcomings of cloud computing, and propose a framework of privacy protection; second, we discuss and analyze basic ABE, KP-ABE (key policy attribute-based  ...  cloud computing; finally, we point out corresponding privacy protection laws to make up for the technical deficiencies.  ...  Mobile cloud involves a large number of task allocations in the scheduling process. How to solve the contradiction between cloud user privacy and task allocation is a challenge for mobile cloud.  ... 
doi:10.1109/access.2019.2946185 fatcat:tbg5a25f5rd3je4mogemegrvje

A Secured Data Processing Technique for Effective Utilization of Cloud Computing

Mbarek Marwan, Ali Kartit, Hassan Ouahmane
2018 Journal of Data Mining and Digital Humanities  
Recently, various solutions have been suggested tosecure data processing in cloud environement.  ...  Specifically, security is the majorfactor hindering the widespread acceptance of this new concept. As a case study, we review the use ofcloud computing to process digital images safely.  ...  However, homomorphic encryption is too slow for most practical applications that require complex image processing operations.  ... 
doi:10.46298/jdmdh.4085 fatcat:hbvlhd6bk5ghvhn6exdmdn6xsa

Improved Searchable Encryption via Conglomerate Keys in Federated Cloud Storage

G. Kavitha, R. Priya
2016 Indian Journal of Science and Technology  
Objectives: Cloud computing is the sort of computing process that shares the data and its resources in the Internet.  ...  Findings: By reducing the count of trapdoor function to cloud data from the multi-user, an effective search over the encrypted data is performed.  ...  In 12 enhanced the HABE concept by the re-encryption process.  ... 
doi:10.17485/ijst/2016/v9i42/97522 fatcat:tgtj7uffh5bwzpyign7qyb5cse

An Efficient File Hierarchy based E-System with Clinical Document Architecture in Cloud Computing

Archana. P, Prasanna. S
2018 International Journal of Trend in Scientific Research and Development  
They collect the real time personal information (PHI) and patient's physical problem and transmitted it to the healthcare provider. share the PHR information in cloud computing, a patient divides his PHR  ...  Then the patient adopts CP-ABE scheme to encrypt the information m1 and m2 by different access policies based on the actual need. Also we propose The Clinical Document Architecture (CDA).  ...  CLOUD STORAGE Patients can store their personal data and upload records on cloud storage. For security reasons, all data must be encrypted. It uses ABE algorithm for encryption.  ... 
doi:10.31142/ijtsrd10785 fatcat:r35em5ncdregrkcpew3wn7uuqm
« Previous Showing results 1 — 15 out of 8,387 results