A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Survey on securing data storage in the cloud
2014
APSIPA Transactions on Signal and Information Processing
In the meantime, security and privacy challenges are brought forward while the number of cloud storage user increases expeditiously. ...
For each of the three security objectives, we discuss the new unique challenges faced by the cloud storage services, summarize key issues discussed in the current literature, examine, and compare the existing ...
This method utilized the Order-Preserving Symmetric Encryption (OPSE) [79, 80] , which achieves both security and privacy-preserving by protecting sensitive weighted information. ...
doi:10.1017/atsip.2014.6
fatcat:i5365o5inzh5hb6yrnhvzbjaqu
Cloud Computing for Enhanced Mobile Health Applications
2010
2010 IEEE Second International Conference on Cloud Computing Technology and Science
The proposed framework uses a Cloud Computing protocol management model which intends to provide multimedia sensor signal processing & security as a service to mobile devices. ...
Our approach suggests that multimedia and security operations can be performed in the cloud, allowing mobile health service providers to subscribe and extend the capabilities of their mobile health applications ...
Among these are multimedia sensor signal processing and security management operations which have not been given much attention in mobile cloud computing research field. ...
doi:10.1109/cloudcom.2010.31
dblp:conf/cloudcom/NkosiM10
fatcat:etosp6ui5fbrdafhcmoiawygh4
Cloud Computing in VANETs: Architecture, Taxonomy, and Challenges
2017
IETE Technical Review
In case of extensive computing need for longer duration, vehicle's in-built technologies can be utilized for establishing durable connection to a conventional cloud. ...
Whaiduzzaman et al. [14] has explored VCC by presenting a taxonomy based on strategic management, security and privacy, cloud formations, inter-cloud communication and applications issues. ...
ACKNOWLEDGMENT The research is supported by Ministry of Education Malaysia (MOE) and conducted in collaboration with Research Management Center (RMC) at University Teknologi Malaysia (UTM) under VOT NUMBER ...
doi:10.1080/02564602.2017.1342572
fatcat:ooyjke73gzedvi7wugizvim4km
Secure Outsourcing Algorithm of BTC Feature Extraction in Cloud Computing
2020
IEEE Access
Advances in cloud computing have aroused many researchers' interest in privacy-preserving feature extraction over outsourced multimedia data, especially private image data. ...
Since block truncation coding (BTC) is known as a simple and efficient technology for image compression, this paper focuses on privacy-preserving feature extraction in BTC compressed domain. ...
Erkin et al. summarized cryptographic primitives and some applications in secure signal processing [32] . ...
doi:10.1109/access.2020.3000683
fatcat:kcqwyfs4bnh3rharj4g43uvix4
User Data Integrating with Anti-Collusion Scheme and SVC in Cloud Groups
2018
International Journal of Trend in Scientific Research and Development
Sharing data while providing privacy preserving is still a challenging problem, when change of the membership. It might cause to the collusion attack for an unsecured cloud. ...
Sharing data while providing privacy preserving is still a challenging problem, when change of the membership. It might cause to the collusion attack for an unsecured cloud. ...
In this paper we address the issue of privacy preserving data mining. ...
doi:10.31142/ijtsrd9607
fatcat:duyrkvkf4rdclhxzg7yjlyledq
Efficient and Secure Mobile Cloud Networking
[article]
2021
arXiv
pre-print
Several mobile cloud architectures have been proposed but none was suitable for all mobile applications which resulted in lower customer satisfaction. ...
This dissertation proposes a new mobile cloud architecture which positions the mobile operator at the core of this technology equipped with a revenue-making business model. ...
Architecture provided security: security features that are offered by the technology/operator/architecture such as: location privacy preserving mechanism, interception detection etc. ...
arXiv:2102.09051v2
fatcat:jfdwtdw75nef3fmxwaogbazxvq
Security Data Auditing based on Multifunction Digital Watermark for Multimedia File in Cloud Storage
2014
International Journal of Multimedia and Ubiquitous Engineering
the security features of audit service for multimedia data outsourcing and the corresponding properties of digital watermarking. ...
We define specially a PDP model for multimedia file, and present a framework based on digital watermarking for multimedia data storage audit service: Defining the security features of audit service for ...
With the same reason as [6] , these protocols do not support data privacy. In [11] , Wang et al. extended their scheme to be privacy preserving. ...
doi:10.14257/ijmue.2014.9.9.24
fatcat:ktueaapw7nf27fdhmof3gsp7ta
Mobile Cloud Computing: Taxonomy and Challenges
2020
Journal of Computer Networks and Communications
The issues include energy efficiency in MCC, secured MCC, user-satisfied applications and Quality of Service-aware MCC (QoS). ...
MCC has a qualitative, flexible, and cost-effective delivery platform for providing services to mobile cloud users with the aid of the Internet. ...
Acknowledgments e research, whose summary has been provided in the abstract, was supported by the Ministry of Education Malaysia (MOE) and conducted in collaboration with Research Management Center (RMC ...
doi:10.1155/2020/2547921
fatcat:b3gjy7v6cvbfxlvdmghaqksciq
Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions
2015
IEEE Communications Magazine
Anonymity, as an effective solution for privacy preservation, has also been adopted to preserve mobile users' privacy in mobile crowdsensing [12] . ...
Therefore, sophisticated security and privacy preservation techniques should be elaborately developed to mitigate these severe challenges for localbased mobile crowdsensing. In [12] , Wang et al. ...
doi:10.1109/mcom.2015.7060488
fatcat:t5t5vlmmeje3diusc3c4k7wvje
Mobile Cloud for Assistive Healthcare (MoCAsH)
2010
2010 IEEE Asia-Pacific Services Computing Conference
The Cloud may just be the right technology for healthcare infrastructure. ...
MoCAsH addresses security and privacy issues by deploying selective and federated P2P Cloud to protect data, preserve data ownership and strengthen aspects of security. ...
This model enabled quick-dynamic network switch according to current network conditions to guarantee a successful content delivery for multimedia streaming in a heterogeneous network. ...
doi:10.1109/apscc.2010.102
dblp:conf/apscc/HoangC10
fatcat:ae6ueft2lbcpzax6ndmfnczw4q
A Cloud-based Framework to Secure Medical Image Processing
2018
Journal of Mobile Multimedia
In the last few years, advanced software for processing medical images has gained a great interest in modern medicine. ...
Regardless of its significant financial benefits, the transition to the cloud environment gives rise to security and privacy problems, especially in the healthcare domain. ...
The adoption of this new technology in healthcare domain, however, leaves room for potential security threats. ...
doi:10.13052/jmm1550-4646.1434
fatcat:2sg23kygirbefhi4ef3fdrabhm
Secure data access in cloud computing
2010
2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application
In cloud computing various security algorithms are used to store the data in a secure and safe manner. ...
There is a need to protect the data against unauthorized access, therefore the need to use authentication. Secure the data in cloud means store it safely, authenticate and access easily. ...
Res., 23 (Sensing, Signal Processing and Security):[363][364][365][366][367][368][369] 2015 ...
doi:10.1109/imsaa.2010.5729397
fatcat:je6hya7pnvcqjl4dzkkg5kgixu
Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems
2021
Electronics
Cloud and Edge computing have emerged as the most widely used technologies, including fog computing and the Internet of Things (IoT). ...
Software and hardware tools used in the digital forensic process, forensic methods for handling tampered sound files, hidden files, image files, or images with steganography, etc. ...
PSIRS can remove up to 80% of the stego without affecting the visual appearance and video quality. The authors of [108] analyzed cutting-edge techniques for steganography and steganalysis. ...
doi:10.3390/electronics10111229
fatcat:mkutuyvfinhajcmpymcc57zrka
Healthcare Information Technology Cloud
2017
International Journal of Engineering Research and
The term "cloud computing" is heard by almost everyone in some context or the other. It is a technology that was born in the last decade and has already taken its place in the current business world. ...
The NIST definition -"Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications ...
offers multimedia sensor signal processing to mobile devices so that they no longer have to do all the heavy computation. ...
doi:10.17577/ijertv6is020276
fatcat:slmbuy4tcnfz3bfqjc35ilczie
Integration of Cloud computing and Internet of Things: A survey
2016
Future generations computer systems
Many works in literature have surveyed Cloud and IoT separately and, more precisely, their main properties, features, underlying technologies, and open issues. ...
In this paper, we focus our attention on the integration of Cloud and IoT, which is what we call the CloudIoT paradigm. ...
ACKNOWLEDGEMENTS This work is partially funded by the MIUR projects: PLATINO (P ON 01 01007), SMART HEALTH (P ON 04a2 C), S2-MOVE (P ON 04a3 00058), SIRIO (P ON 01 02425), and art. 11 DM 593/2000 for NM2 ...
doi:10.1016/j.future.2015.09.021
fatcat:aatr42cbtfautpyo3bqs4yhy6a
« Previous
Showing results 1 — 15 out of 2,398 results