128,889 Hits in 6.3 sec

Analytical Literature Survey on Existing Schemes to Improve Data Security and Robustness in Cloud Computing

N. Abirami, S. Murugan
2016 International Journal of Engineering Research and  
In user perspective instead of storing the data in USB drive or hard-disk, the data is stored in a remote unknown location.  ...  This paper gives the various issues of cloud computing systems, the existing solutions to avoid the issues like security and data robustness, performance analysis of the schemes and comparison of the schemes  ...  This scheme combines the existing private and public cloud storage servers to function cooperatively in order to store and manage user's data.  ... 
doi:10.17577/ijertv5is100295 fatcat:qjvag43wsvho5iuvt6gn4q5vsy

A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage

Run Xie, Chanlian He, Dongqing Xie, Chongzhi Gao, Xiaojun Zhang
2018 Security and Communication Networks  
The ciphertext retrieval is able to realize utilization over encrypted data and searchable public key encryption is an effective way in the construction of encrypted data retrieval.  ...  Finally, security analysis and efficiency comparison show that the proposal is effective for the retrieval of encrypted data in cloud computing.  ...  Acknowledgments This work is supported by Scientific Research Fund of Sichuan Provincial Education Department (no. 18ZA0546) and Guangzhou Scholars Project for Universities of Guangzhou.  ... 
doi:10.1155/2018/7254305 fatcat:kussjny5dveahbnaejv37yklve

A Novel Private Cloud Document Archival System Architecture Based on ICmetrics

Hasan Tahir, Ruhma Tahir, Klaus McDonald-Maier
2013 2013 Fourth International Conference on Emerging Security Technologies  
The proposed secure document archival system has been specifically designed for the elimination of paper based systems in organization.  ...  The architecture attempts to shift paper based systems to an electronic archival system where the documents are secure and the system is supportive to user demands and features.  ...  ACKNOWLEDGMENT The authors gratefully acknowledge the support of the UK Engineering and Physical Sciences Research Council under grant EP/K004638/1.  ... 
doi:10.1109/est.2013.24 dblp:conf/est/TahirTM13 fatcat:nlloegf5gnhutmxircvmwihhf4


Archana B.Kadga .
2014 International Journal of Research in Engineering and Technology  
The public key of WebIBC is provided by identity based cryptography, eliminating the need of public key and certificate online retrieval; the private key is supplied by the fragment identifier of the URL  ...  The growing popularity of web applications in the last few years has led users to give the management of their data to online application providers, which will endanger the security and privacy of the  ...  In the web browser and JavaScript environment, the schemes based on pairing are too complex and over kill.  ... 
doi:10.15623/ijret.2014.0315034 fatcat:mswbz7puajejrj7udepxuoragy

Principles for robust evaluation infrastructure

Justin Zobel, William Webber, Mark Sanderson, Alistair Moffat
2011 Proceedings of the 2011 workshop on Data infrastructurEs for supporting information retrieval evaluation - DESIRE '11  
The standard "Cranfield" approach to the evaluation of information retrieval systems has been used and refined for nearly fifty years, and has been a key element in the development of large-scale retrieval  ...  In this position statement we briefly review some aspects of evaluation and, based on our research and observations over the last decade, outline some principles on which we believe new infrastructure  ...  We must accept that some experiments will involve private systems, private data, or both.  ... 
doi:10.1145/2064227.2064247 fatcat:pilg7zgq4zc4xbgt7sqfdjfwbq

Efficient Data Retrieval and Fine Grained Access Control on Secure Hybrid Cloud

2020 International Journal of Emerging Trends in Engineering Research  
Healthcare data has many private attributes to be secured from leakage due to inference either direct or indirect. Hybrid cloud is a model which is a combination of both private and public clouds.  ...  While substantial work has already been around for a while for distributing healthcare data, they do not seem to possess greater efficiency in terms of both data retrieval and consideration for fine coarse  ...  Perturbed file name (saved in public cloud) 4. Private key The perturbed file is retrieved from the public cloud and using the perturbation key, deperturbation is done on the data.  ... 
doi:10.30534/ijeter/2020/258102020 fatcat:3mqef23b7fc67pyzlzwrz3g22y

Elliptic Curve Cryptosystem for Email Encryption

Abhijit Mitra, Saikat Chakrabarty, Poojarini Mitra
2010 International journal of computer and communication technology  
In this project we use Elliptic Curve Cryptography (ECC) over Galois field. This system has been proven to be stronger than known algorithms like RSA, DSA, etc.  ...  Another important factor is the key strength, i.e. the difficulty in breaking the key and retrieving the plain text. There are various cryptographic algorithms.  ...  We convey our heartiest thanks to the Head of the Department and all the faculty members of Computer Science and Engineering, Calcutta Institute of Engineering and Management for their motivation and co-operation  ... 
doi:10.47893/ijcct.2010.1049 fatcat:4op7zthicbewpjgdvljed2wirm

HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare

Jinyuan Sun, Xiaoyan Zhu, Chi Zhang, Yuguang Fang
2011 2011 31st International Conference on Distributed Computing Systems  
Last but not least, HCPP leverages wireless network access to support efficient and private storage/retrieval of PHI, which underlies a secure and feasible EHR system.  ...  In this paper, we propose a secure EHR system, HCPP (Healthcare system for Patient Privacy), based on cryptographic constructions and existing wireless network infrastructures, to provide privacy protection  ...  The private storage and retrieval of patients' (encrypted) PHI in our secure EHR system is constructed based on [17] to guarantee patient privacy.  ... 
doi:10.1109/icdcs.2011.83 dblp:conf/icdcs/SunZZF11 fatcat:nlfknc6qarhtjesbnttazckazy

A Survey on Storage Techniques in Cloud Computing

Samson Akintoye, Antoine Bagula, Yacine Djemaiel, Noureddine Bouriga
2017 International Journal of Computer Applications  
Cloud computing is a computing paradigm, where a large pool of systems are connected in private, public or hybrid networks, to provide dynamically scalable infrastructure for computing resources.  ...  One of the services provided by cloud computing is cloud storage that enables the upload and the retrieval of different kinds of data.  ...  In public cloud, services are offered over the Internet and are owned and operated by a cloud provider.  ... 
doi:10.5120/ijca2017913472 fatcat:joak5sjqajfqzg74xq5hzivyee

Node Management without Directory Servers in DHT-based Anonymous Communication Systems using ID-based Encryption

Hiroyuki Tanaka, Shoichi Saito, Hiroshi Matsuo
2012 International Journal for Information Security Research  
To solve this problem, applying ID-Based Encryption has been proposed, but in the existing method, directory servers continue to exist.  ...  Such systems usually use directory servers to manage the public keys of participant nodes and such node information as IP address, port number, and NodeID.  ...  Acknowledgements This research was partly supported by the Grant-in-Aid for Scientific Research (#20500064) from the Ministry of Education, Culture, Sports, Science and Technology (MEXT), Japan.  ... 
doi:10.20533/ijisr.2042.4639.2012.0019 fatcat:nqfq4hr4vbd2jpvjhlhjiiu7gy

Distributed File Sharing and Retrieval Model for Cloud Virtual Environment

M. Ali, N. Q. Soomro, H. Ali, A. Awan, M. Kirmani
2019 Zenodo  
Data would be stored and retrieved in slices, hence the chances of data forgery are diminishing.  ...  This research provides the architecture for splitting user data and the solution in retrieving different data chunks, stored on different cloud storages.  ...  Consists of private clouds along with multiple public clouds Master manages all the system data and file directory structure.  ... 
doi:10.5281/zenodo.2648029 fatcat:6egturkbhjgh3khgptuczmjmia

WebIBC: Identity Based Cryptography for Client Side Security in Web Applications

Zhi Guan, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhong Chen, Xianghao Nan
2008 2008 The 28th International Conference on Distributed Computing Systems  
The public key of We-bIBC is provided by identity based cryptography, eliminates the need of public key and certificate online retrieval; the private key is supplied by the fragment identifier of the URL  ...  The growing popularity of web applications in the last few years has led users to give the management of their data to online application providers, which will endanger the security and privacy of the  ...  In the web browser and javascript environment, the schemes based on pairing are too complex and over kill.  ... 
doi:10.1109/icdcs.2008.24 dblp:conf/icdcs/GuanCZCCN08 fatcat:w5jzkhzkofdrfl2ym7sx2kskrq

A Survey on Secure Ranked Keyword Search over Outsourced Encrypted Cloud Data

Akash Tidke
2021 International Journal for Research in Applied Science and Engineering Technology  
In this paper we present a survey on keyword based searching algorithms. Various searching techniques are used for retrieving the encrypted data from cloud servers.  ...  This survey work involves a comparative study of these keyword based searching algorithms.  ...  It provides best quality for searching over encrypted data and faster in accessing. E.  ... 
doi:10.22214/ijraset.2021.35184 fatcat:ars7ok7ifberxb3fl2juaoz7pu

Attribute-based Encryption for Fine-Grained Access Control on Secure Hybrid Clouds

Sridhar Reddy Vulapula, Srinivas Malladi
2020 International Journal of Advanced Computer Science and Applications  
A hybrid cloud is a mix of both private and public clouds proposed for the storage of health data. Carefully distributing data between private and public clouds to provide protection.  ...  While there has been ample work for the delivery of health data for some time now, it does not appear to be more effective in terms of both data retrieval and consideration for fine-grained access control  ...  Data Storage and Retrieval Efficiency Performance of the proposed method is compared with a similar approach to the fine-grained searchable retrieval system proposed in [5] .  ... 
doi:10.14569/ijacsa.2020.0111047 fatcat:w5oqokj23jctpe4culdtcn6nmi


Tapalina Bhattasali, St. Xavier's College (Autonomous), Kolkata, India
2019 Azerbaijan Journal of High Performance Computing  
Hybrid encryption logic is designed based on AES cipher and homomorphism properties. Limitations of fully Homomorphic encryption are avoided in proposed logic.  ...  Theoretical analysis of homomorphism shows its efficiency to secure searchable index, items, and query vectors required in cloud data retrieval service.  ...  Authorized private keyword search over encrypted data in cloud computing. In 2011 31st International Conference on Distributed Computing Systems(pp. 383-392).  ... 
doi:10.32010/26166127.2019. fatcat:q776lubmrjfadhwtsaoes5u4hu
« Previous Showing results 1 — 15 out of 128,889 results