A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Integrating Security Services in Cloud Service Stores
[chapter]
2015
IFIP Advances in Information and Communication Technology
The result of this integration is then offered as a re-usable service across multiple Cloud platforms through a Cloud service store. ...
In this paper we describe a novel Cloud-based security management solution that empowers Cloud consumers to protect their systems, applications and data in the Cloud, whilst also improving the control ...
Controls to enforce the integrity and security functions can also be integrated in a Cloud Application and Service store as "horizontal" common capabilities at the Cloud service management automation layer ...
doi:10.1007/978-3-319-18491-3_19
fatcat:5upp7lt5pjbgxes5ya5hf5esjm
Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services
2018
Sensors
With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. ...
However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider ...
Integrity Verification and Privacy Guarantee In their effort to guarantee the integrity of data stored in cloud services, many research works present proposals in the domain analyzed in this paper. ...
doi:10.3390/s18030753
pmid:29498641
pmcid:PMC5876826
fatcat:72v24pz7wvb4hcl5h2tkdqbsdy
Preserving Data Confidentiality Using Multi-cloud Architecture
2015
Procedia Computer Science
One central concern in cloud computing is privacy and integrity of data processes in cloud. ...
The security of cloud computing has always been an important aspect of the quality of service from cloud service providers. ...
To solve the data security problems in public environment, we propose an effective model for security and integrity of data stored using multi cloud strategy. ...
doi:10.1016/j.procs.2015.04.035
fatcat:6zozj3xsivao7hjvb7jobsfpvi
SECURE FILE SHARING OF DYNAMIC AUDIT SERVICES IN CLOUD STORAGE
2014
International Journal of Research in Engineering and Technology
Data integrity and storage efficiency are the two important requirements for cloud storage. Authorized users access the data and share the files in secure manner. ...
The cloud storage service (CSS) relieves the burden for storage management and maintenance. Fragment Structure, random sampling and index table is used to construct the Audit service. ...
Cloud service provider offered an audit service to audit the integrity and availability of Secure Storage Pool. ...
doi:10.15623/ijret.2014.0305061
fatcat:4ufwsbl66zanlonrnpkt555ly4
Privacy Preservation using Shamir's Secrete Sharing Algorithm for Data Storage Security
English
2014
International Journal of Computer Trends and Technology
English
Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security. ...
In this paper, we proposed a Shamir's Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. ...
Security in cloud computing can be addressed in many ways as authentication, integrity, confidentiality. Data integrity or data correctness is another security issue that needs to be considered. ...
doi:10.14445/22312803/ijctt-v8p118
fatcat:x25pw5oebfbwzmbnp5netdboyy
Comparative Study of Security Mechanisms in Multi-cloud Environment
2013
International Journal of Computer Applications
Double-checking the security of cloud computing is a foremost factor in the cloud computing natural environment, as users often store sensitive data with cloud storage providers but these providers may ...
Thus it could assist in analyzing best fit scenario for elegant secured cloud computing environment. ...
Service Availability Another foremost anxiety in cloud services is service accessibility. Service accessibility is most important in the cloud computing security. ...
doi:10.5120/13396-1039
fatcat:j2s46uschva3jpue4hqkfd3hfq
Data Security Challenges and Its Solutions in Cloud Computing
2015
Procedia Computer Science
Cloud data are stored and accessed in a remote server with the help of services provided by cloud service providers. ...
In this paper, we highlight data related security challenges in cloud based environment and solutions to overcome. ...
The data stored in remote data center can be accessed or managed through the cloud services provided by the cloud service providers. ...
doi:10.1016/j.procs.2015.04.171
fatcat:eef3xevaq5ggnnntycmczq2n7q
Research of Data Security Model in Cloud Computing Platform for SMEs
2013
International Journal of Security and Its Applications
For this reason this paper proposed a model to solve the problem of data security in cloud computing. The model adopts efficient encryption mechanisms to protect users' data. ...
In recent years, cloud computing has become a major mode to address SMEs inefficient and help improve their competitiveness. ...
In cloud computing environment, users need to check the integrity about the returned data that stored in cloud server. ...
doi:10.14257/ijsia.2013.7.6.10
fatcat:a6aphtcnzvbdjod7v2s55zed4i
Cloud Data Security Using Third Party Auditing and Encryption
IJARCCE - Computer and Communication Engineering
2015
IJARCCE
IJARCCE - Computer and Communication Engineering
Security for the data which is stored on the cloud by user is very important issue. ...
User may expect some security for their data from the cloud service provider, there can be serious issues regarding data security between user and service provider. ...
Data Storage Service System In this module, we considered FOUR entities to store the data in secure manner: Data owner (DO) Data owner has ample of data to be stored on the cloud and can access it when ...
doi:10.17148/ijarcce.2015.4327
fatcat:7k465ldgrzd2dhdjlas5tmbzd4
DIaaS: Data Integrity as a Service in the Cloud
2011
2011 IEEE 4th International Conference on Cloud Computing
the security risk of the data stored in the storage services by checking the data integrity with the help of IMS. ...
Keywords-cloud storage; data integrity; security; data integrity as a service. I. ...
stored data in the cloud, but the client does not trust the data integrity management service. ...
doi:10.1109/cloud.2011.35
dblp:conf/IEEEcloud/NepalCYT11
fatcat:fgc36mfskfbaxct7i5y3bpellq
Issues Related to Data Security and Privacy in Cloud Computing
2018
International Journal for Research in Applied Science and Engineering Technology
Huge data are store on the cloud and the authorized users can access this data with support of various service providers. ...
This paper focus on the data security and privacy issues such as data integrity, data privacy, data availability, data location access control in the cloud computing and the solution to the data security ...
Mervat Bamiah et.al discussed the cloud security challenges and the clouds adopt services in industries [10] . S. ...
doi:10.22214/ijraset.2018.1289
fatcat:k5dgwnpjbbewzi4csgbma75hma
A Review of Cloud Computing Security Issues
2015
International Journal of Education and Management Engineering
Since Cloud computing stores the data and its disseminated resources in the environment, security has become the main obstacle which is hampering the deployment of cloud environments. ...
In today's era, it is most interesting and enticing technology which is offering the services to its users on demand over the internet. ...
to customers in terms of confidentiality, integrity, and other security services. ...
doi:10.5815/ijeme.2015.05.04
fatcat:jdoe544r5nh6vebbw6suuyppgq
A Review of Cloud Computing Security Issues
2015
International Journal of Grid and Distributed Computing
Since Cloud computing stores the data and its disseminated resources in the environment, security has become the main obstacle which is hampering the deployment of cloud environments. ...
In today's era, it is most interesting and enticing technology which is offering the services to its users on demand over the internet. ...
to customers in terms of confidentiality, integrity, and other security services. ...
doi:10.14257/ijgdc.2015.8.5.21
fatcat:3gcn6ysygfa2fjv6s2czcun5hu
Enhancing Data Integrity Proofs with Cloud Storage Security
2017
International Journal of Science and Research (IJSR)
The prime objective is to give effective and efficient method for cloud storage security in cloud computing. We are analyzed types of cloud storage and security aspects in cloud. ...
Data security is considered as the constant issue leading towards a hitch in the adoption of cloud computing. ...
We identified the key challenges and research dimensions that need to be addressed in the data integrity in cloud storage security. ...
doi:10.21275/art20164007
fatcat:qkk3l2boujdz3pbe7uk2nehec4
An Efficient RSA Based Data Integrity Schema in Secured Cloud Storage
2014
Research Journal of Applied Sciences Engineering and Technology
Cloud computing is the next stage in evolution of the internet, which provides large amount of computing and storage to customers provisioned as a service over the internet. ...
In order to make easier rapid deployment and to provide security, publicly auditable cloud data storage is established to reduce energy and save money. ...
In this paper we focus on providing dynamic integrity of the data stored as well as the security problems faced in cloud [7] [8] [9] [10] [11] . ...
doi:10.19026/rjaset.8.1204
fatcat:u45klkyij5anrcykf5pys3xgya
« Previous
Showing results 1 — 15 out of 89,872 results