Filters








2,146 Hits in 8.9 sec

Provenance-based Classification Policy based on Encrypted Search [article]

Xinyu Fan, Faen Zhang, Jiahong Wu, Jingming Guo
2020 arXiv   pre-print
As an important type of cloud data, digital provenance is arousing increasing attention on improving system performance.  ...  classification policies can use provenance as conditions to determine the category of a document.  ...  Provenance-based Classification Policy Provenance-based classification policies classify files based on their provenance.  ... 
arXiv:2001.01946v1 fatcat:2yqkg2cmjbetxjufr5arz4i4ki

Secure Retrieval of Sub-Trees over Encrypted Data Stored in Cloud Storage for Prediction

P. Shanthi, A. Umamakeswari
2016 Indian Journal of Science and Technology  
In our approach the dataset is partitioned based on classification and encrypted before uploading to cloud. Retrieval query returns a subtree from the partitions only when the secret key is matched.  ...  Application/Improvements: This approach can be applied to classify patient electronic health records in cloud storage and query the encrypted data in order to make decisions.  ...  Different types of cryptography-based storages are designed and proven to be secure. Encryption is used to secure data in semi-trusted storage server.  ... 
doi:10.17485/ijst/2016/v9i48/108028 fatcat:gf32u6mcgjdebnr46ic44tdneq

Security and Privacy-preserving Challenges of e-Health Solutions in Cloud Computing

Shekha Chenthara, Khandakar Ahmed, Hua Wang, Frank Whittaker
2019 IEEE Access  
Studies must focus on efficient comprehensive security mechanisms for EHR and also explore techniques to maintain the integrity and confidentiality of patients' information.  ...  We carry an intensive study in the IEEE, Science Direct, Google Scholar, PubMed, and ACM for papers on EHR approach published between 2000 and 2018 and summarized them in terms of the architecture types  ...  Hui Cui for their valuable comments, suggestions and reviews.  ... 
doi:10.1109/access.2019.2919982 fatcat:3sawv3nb5ndnncdzzk5q2anuwq

A Survey on Blockchain Cloud Integration [article]

Soumik Sarker, Arnob Kumar Saha, Md Sadek Ferdous
2020 arXiv   pre-print
Cloud is an on-demand service paradigm facilitating the availability of shared resources for data storage and computation.  ...  In recent years, the integration of blockchain and cloud has received significant attention for ensuring efficiency, transparency, security and even for offering better cloud services in the form of novel  ...  Blockchain-based access control models for cloud aim to tackle two major challenges: • In an encryption-based traditional access control model, one trusted central server is required to store access policies  ... 
arXiv:2012.02644v1 fatcat:ltuxd45vd5hipmemaf5u6sathm

A Survey on Public Key Encryption with Keyword Search: Taxonomy and Methods

M.H. Noorallahzade, R. Alimoradi, A. Gholami, Ram N. Mohapatra
2022 International Journal of Mathematics and Mathematical Sciences  
To solve this problem, public key encryption with keyword search (PEKS) is suggested, which is a widely used method.  ...  Given the many benefits that cloud computing brings, organizations tend to outsource most of their data to reduce a large portion of their costs, but concern about the privacy of data is a major obstacle  ...  [35] first introduced PEKS-CP-ABE and introduced a ciphertext-based encryption scheme to enable keyword search. e sender can specify the policy of access to his data so that only the receivers of legal  ... 
doi:10.1155/2022/3223509 fatcat:5ophwgumlvfxloq2iytpfujfza

A group-key-based sensitive attribute protection in cloud storage using modified random Fibonacci cryptography

M. Sumathi, S. Sangeetha
2020 Complex & Intelligent Systems  
Cloud computing is an eminent technology for providing a data storage facility with efficient storage, maintenance, management and remote backups.  ...  Based on inter-organization usage and data owner's willingness, sensitive attribute is divided into 'n + 1′ subgroups and each subgroup is encrypted by 'n + 1' group keys.  ...  This on-premise storage technique provided more protection than the third-party storage location-based cloud storage system.  ... 
doi:10.1007/s40747-020-00162-3 fatcat:n2sh5lrbqjhjlp47w3brk5zy6u

Security challenges and solutions using healthcare cloud computing

Mohammad Mehrtak, SeyedAhmad SeyedAlinaghi, Mehrzad MohsseniPour, Tayebeh Noori, Amirali Karimi, Ahmadreza Shamsabadi, Mohammad Heydari, Alireza Barzegary, Pegah Mirzapour, Mahdi Soleymanzadeh, Farzin Vahedi, Esmaeil Mehraeen (+1 others)
2021 Journal of Medicine and Life  
Further, data encryption, authentication, and classification, besides application programming interfaces (API), were security solutions to cloud infrastructure.  ...  Data encryption could be applied to store and retrieve data from the cloud in order to provide secure communication.  ...  based on the type technique used, classification based on the attack detection principle, classification based on reaction time, classification based on deployment point, classification based on the  ... 
doi:10.25122/jml-2021-0100 pmid:34621367 pmcid:PMC8485370 fatcat:k2ltpgsaurhffgkdmkjlwofwdy

STRATUS: Towards Returning Data Control to Cloud Users [chapter]

Ryan K. L. Ko, Giovanni Russello, Richard Nelson, Shaoning Pang, Aloysius Cheang, Gill Dobbie, Abdolhossein Sarrafzadeh, Sivadon Chaisiri, Muhammad Rizwan Asghar, Geoffrey Holmes
2015 Lecture Notes in Computer Science  
Despite being transferred across and within clouds over encrypted channels, data often has to be decrypted within the database for it to be processed.  ...  In this paper, we propose a user-centric approach which returns data control to the data owners -empowering users with data provenance, transparency and auditability, homomorphic encryption, situation  ...  Acknowledgements This research is supported by STRATUS (Security Technologies Returning Accountability, Trust and User-Centric Services in the Cloud) (https://stratus.org.nz), a science investment project  ... 
doi:10.1007/978-3-319-27161-3_6 fatcat:mberng3n2zhslmosqcqf3nraau

Enhanced Attribute Based Encryption for Cloud Computing

N. Saravana Kumar, G.V. Rajya Lakshmi, B. Balamurugan
2015 Procedia Computer Science  
Secondly, a new encryption method based on Attribute Based Encryption (ABE) using hash functions, digital signature and asymmetric encryptions scheme has been proposed.  ...  Our proposed algorithm is simplified yet efficient algorithm that can implemented for cloud critical application.  ...  Fig. 1 . 1 Classification of Attribute Based Encryption Fig. 2 . 2 Classification of Cloud Application Based on Risk.  ... 
doi:10.1016/j.procs.2015.02.127 fatcat:thzgvzhc4ff2ro4dqwwqwjd5du

Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions

Pan Jun Sun
2019 IEEE Access  
In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (ABE), trust and reputation, but they are scattered and lack unified  ...  encryption), CP-ABE (ciphertext policy attribute-based encryption), access structure, revocation mechanism, multiauthority, fine-grained, trace mechanism, proxy re-encryption(PRE), hierarchical encryption  ...  Medshare monitored entities that access data from data storage systems for malicious use.  ... 
doi:10.1109/access.2019.2946185 fatcat:tbg5a25f5rd3je4mogemegrvje

A review of the state of the arts in privacy and security in the eHealth cloud

Aqeel Sahi, David Lai, Yan Li
2021 IEEE Access  
Since the security of data sharing is an important factor for any cloud-based system, especially health cloud systems, Liang and Susilo defined a notation searchable attribute-based proxy re-encryption  ...  Yang et al. presented a privacy preservation approach for health records in eHealth clouds [40] . This approach was based on the classification of health record attributes.  ...  Author Name: Preparation of Papers for IEEE Access (February 2017) VOLUME XX, 2017  ... 
doi:10.1109/access.2021.3098708 fatcat:u6b4oflz2ndxtbape5becffffu

An Enhanced Technique to discover web data extraction and Data mining in Multi Cloud Server

Dadi Madhu SivaRama Krishna, S.Suryanarayana Raju and Ajay Dilip Kumar Marapatla
2021 International journal of modern trends in science and technology  
from the global network ( web), and data mining techniques is required.The primary contribution of this study is the proposal of a system for collecting categorical online data on several cloud servers  ...  We proposed KeyGen algorithm to maintain data security by using cryptographic concepts with respective ABE (attribute-based encryption) and cypher text policy (cypher text policy) are two types of attribute-based  ...  Performance Evaluation Built on the Encryption of Cipher Text Using Policy Attributes technique, the Attribute Based Encryption Storage System.  ... 
doi:10.46501/ijmtst0710006 fatcat:3cnncp5sxnbv7bqfow3wsjgta4

Data Privacy and Security in Cloud Environment Using Cryptography Approach

Jayashree Agarkhed, R. Ashalatha
2018 Asian Journal of Computer Science and Technology  
Cloud computing accommodates huge data storage and computing capabilities to its users. The cloud storage service is considered to be the best quality cloud maintenance service.  ...  The secrecy and concealment of data are considered an important issue of concern in cloud field.  ...  The sensitive data are protected using an encryption based system for securing the cloud systems.  ... 
doi:10.51983/ajcst-2018.7.1.1830 fatcat:dgmu57eahjendky2a5imwzihri

Big Data Handling Approach for Unauthorized Cloud Computing Access

Abdul Razaque, Nazerke Shaldanbayeva, Bandar Alotaibi, Munif Alotaibi, Akhmetov Murat, Aziz Alotaibi
2022 Electronics  
The HUDH scheme involves three algorithms: advanced encryption standards (AES) for encryption, attribute-based access control (ABAC) for data access control, and hybrid intrusion detection (HID) for unauthorized  ...  An illegitimate intruder may gain access to a sensitive cloud computing system and use the data for inappropriate purposes, which may lead to losses in business or system damage.  ...  In addition, the authors would like to thank the dean of scientific research at Shaqra University for supporting this work.  ... 
doi:10.3390/electronics11010137 fatcat:42677py64zcpvd6zkgkaxe3mii

A Review of Secure and Privacy-Preserving Medical Data Sharing

Hao Jin, Yan Luo, Peilong Li, Jomol Mathew
2019 IEEE Access  
We also discuss potential research topics on blockchain-based medical data sharing.  ...  This paper surveys the state-of-the-art schemes on secure and privacy-preserving medical data sharing of the past decade with a focus on blockchain-based approaches.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous referees for their reviews and insightful suggestions to improve this paper.  ... 
doi:10.1109/access.2019.2916503 fatcat:6ys5ofwtmjgldjcsvvus7hpn2a
« Previous Showing results 1 — 15 out of 2,146 results