2,398 Hits in 5.6 sec

Survey on securing data storage in the cloud

Chun-Ting Huang, Lei Huang, Zhongyuan Qin, Hang Yuan, Lan Zhou, Vijay Varadharajan, C.-C. Jay Kuo
2014 APSIPA Transactions on Signal and Information Processing  
In the meantime, security and privacy challenges are brought forward while the number of cloud storage user increases expeditiously.  ...  For each of the three security objectives, we discuss the new unique challenges faced by the cloud storage services, summarize key issues discussed in the current literature, examine, and compare the existing  ...  This method utilized the Order-Preserving Symmetric Encryption (OPSE) [79, 80] , which achieves both security and privacy-preserving by protecting sensitive weighted information.  ... 
doi:10.1017/atsip.2014.6 fatcat:i5365o5inzh5hb6yrnhvzbjaqu

Cloud Computing for Enhanced Mobile Health Applications

M.T. Nkosi, F. Mekuria
2010 2010 IEEE Second International Conference on Cloud Computing Technology and Science  
The proposed framework uses a Cloud Computing protocol management model which intends to provide multimedia sensor signal processing & security as a service to mobile devices.  ...  Our approach suggests that multimedia and security operations can be performed in the cloud, allowing mobile health service providers to subscribe and extend the capabilities of their mobile health applications  ...  Among these are multimedia sensor signal processing and security management operations which have not been given much attention in mobile cloud computing research field.  ... 
doi:10.1109/cloudcom.2010.31 dblp:conf/cloudcom/NkosiM10 fatcat:etosp6ui5fbrdafhcmoiawygh4

Cloud Computing in VANETs: Architecture, Taxonomy, and Challenges

Ahmed Aliyu, Abdul Hanan Abdullah, Omprakash Kaiwartya, Yue Cao, Mohammed Joda Usman, Sushil Kumar, D. K. Lobiyal, Ram Shringar Raw
2017 IETE Technical Review  
In case of extensive computing need for longer duration, vehicle's in-built technologies can be utilized for establishing durable connection to a conventional cloud.  ...  Whaiduzzaman et al. [14] has explored VCC by presenting a taxonomy based on strategic management, security and privacy, cloud formations, inter-cloud communication and applications issues.  ...  ACKNOWLEDGMENT The research is supported by Ministry of Education Malaysia (MOE) and conducted in collaboration with Research Management Center (RMC) at University Teknologi Malaysia (UTM) under VOT NUMBER  ... 
doi:10.1080/02564602.2017.1342572 fatcat:ooyjke73gzedvi7wugizvim4km

Secure Outsourcing Algorithm of BTC Feature Extraction in Cloud Computing

Mingfang Jiang, Hengfu Yang
2020 IEEE Access  
Advances in cloud computing have aroused many researchers' interest in privacy-preserving feature extraction over outsourced multimedia data, especially private image data.  ...  Since block truncation coding (BTC) is known as a simple and efficient technology for image compression, this paper focuses on privacy-preserving feature extraction in BTC compressed domain.  ...  Erkin et al. summarized cryptographic primitives and some applications in secure signal processing [32] .  ... 
doi:10.1109/access.2020.3000683 fatcat:kcqwyfs4bnh3rharj4g43uvix4

User Data Integrating with Anti-Collusion Scheme and SVC in Cloud Groups

Meenambigai. D, Mathavan. V
2018 International Journal of Trend in Scientific Research and Development  
Sharing data while providing privacy preserving is still a challenging problem, when change of the membership. It might cause to the collusion attack for an unsecured cloud.  ...  Sharing data while providing privacy preserving is still a challenging problem, when change of the membership. It might cause to the collusion attack for an unsecured cloud.  ...  In this paper we address the issue of privacy preserving data mining.  ... 
doi:10.31142/ijtsrd9607 fatcat:duyrkvkf4rdclhxzg7yjlyledq

Efficient and Secure Mobile Cloud Networking [article]

Jacques Bou Abdo
2021 arXiv   pre-print
Several mobile cloud architectures have been proposed but none was suitable for all mobile applications which resulted in lower customer satisfaction.  ...  This dissertation proposes a new mobile cloud architecture which positions the mobile operator at the core of this technology equipped with a revenue-making business model.  ...  Architecture provided security: security features that are offered by the technology/operator/architecture such as: location privacy preserving mechanism, interception detection etc.  ... 
arXiv:2102.09051v2 fatcat:jfdwtdw75nef3fmxwaogbazxvq

Security Data Auditing based on Multifunction Digital Watermark for Multimedia File in Cloud Storage

Yongjun Ren, Jian Shen, Jin Wang, Jiang Xu, Liming Fang
2014 International Journal of Multimedia and Ubiquitous Engineering  
the security features of audit service for multimedia data outsourcing and the corresponding properties of digital watermarking.  ...  We define specially a PDP model for multimedia file, and present a framework based on digital watermarking for multimedia data storage audit service: Defining the security features of audit service for  ...  With the same reason as [6] , these protocols do not support data privacy. In [11] , Wang et al. extended their scheme to be privacy preserving.  ... 
doi:10.14257/ijmue.2014.9.9.24 fatcat:ktueaapw7nf27fdhmof3gsp7ta

Mobile Cloud Computing: Taxonomy and Challenges

Ahmed Aliyu, Abdul Hanan Abdullah, Omprakash Kaiwartya, Syed Hamid Hussain Madni, Usman Mohammed Joda, Abubakar Ado, Muhammad Tayyab
2020 Journal of Computer Networks and Communications  
The issues include energy efficiency in MCC, secured MCC, user-satisfied applications and Quality of Service-aware MCC (QoS).  ...  MCC has a qualitative, flexible, and cost-effective delivery platform for providing services to mobile cloud users with the aid of the Internet.  ...  Acknowledgments e research, whose summary has been provided in the abstract, was supported by the Ministry of Education Malaysia (MOE) and conducted in collaboration with Research Management Center (RMC  ... 
doi:10.1155/2020/2547921 fatcat:b3gjy7v6cvbfxlvdmghaqksciq

Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions

Ju Ren, Yaoxue Zhang, Kuan Zhang, Xuemin Shen
2015 IEEE Communications Magazine  
Anonymity, as an effective solution for privacy preservation, has also been adopted to preserve mobile users' privacy in mobile crowdsensing [12] .  ...  Therefore, sophisticated security and privacy preservation techniques should be elaborately developed to mitigate these severe challenges for localbased mobile crowdsensing. In [12] , Wang et al.  ... 
doi:10.1109/mcom.2015.7060488 fatcat:t5t5vlmmeje3diusc3c4k7wvje

Mobile Cloud for Assistive Healthcare (MoCAsH)

Doan B. Hoang, Lingfeng Chen
2010 2010 IEEE Asia-Pacific Services Computing Conference  
The Cloud may just be the right technology for healthcare infrastructure.  ...  MoCAsH addresses security and privacy issues by deploying selective and federated P2P Cloud to protect data, preserve data ownership and strengthen aspects of security.  ...  This model enabled quick-dynamic network switch according to current network conditions to guarantee a successful content delivery for multimedia streaming in a heterogeneous network.  ... 
doi:10.1109/apscc.2010.102 dblp:conf/apscc/HoangC10 fatcat:ae6ueft2lbcpzax6ndmfnczw4q

A Cloud-based Framework to Secure Medical Image Processing

Mbarek Marwan, Ali Kartit, Hassan Ouahmane
2018 Journal of Mobile Multimedia  
In the last few years, advanced software for processing medical images has gained a great interest in modern medicine.  ...  Regardless of its significant financial benefits, the transition to the cloud environment gives rise to security and privacy problems, especially in the healthcare domain.  ...  The adoption of this new technology in healthcare domain, however, leaves room for potential security threats.  ... 
doi:10.13052/jmm1550-4646.1434 fatcat:2sg23kygirbefhi4ef3fdrabhm

Secure data access in cloud computing

Sunil Sanka, Chittaranjan Hota, Muttukrishnan Rajarajan
2010 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application  
In cloud computing various security algorithms are used to store the data in a secure and safe manner.  ...  There is a need to protect the data against unauthorized access, therefore the need to use authentication. Secure the data in cloud means store it safely, authenticate and access easily.  ...  Res., 23 (Sensing, Signal Processing and Security):[363][364][365][366][367][368][369] 2015  ... 
doi:10.1109/imsaa.2010.5729397 fatcat:je6hya7pnvcqjl4dzkkg5kgixu

Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems

Vijay Prakash, Alex Williams, Lalit Garg, Claudio Savaglio, Seema Bawa
2021 Electronics  
Cloud and Edge computing have emerged as the most widely used technologies, including fog computing and the Internet of Things (IoT).  ...  Software and hardware tools used in the digital forensic process, forensic methods for handling tampered sound files, hidden files, image files, or images with steganography, etc.  ...  PSIRS can remove up to 80% of the stego without affecting the visual appearance and video quality. The authors of [108] analyzed cutting-edge techniques for steganography and steganalysis.  ... 
doi:10.3390/electronics10111229 fatcat:mkutuyvfinhajcmpymcc57zrka

Healthcare Information Technology Cloud

Gaurav Shad
2017 International Journal of Engineering Research and  
The term "cloud computing" is heard by almost everyone in some context or the other. It is a technology that was born in the last decade and has already taken its place in the current business world.  ...  The NIST definition -"Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications  ...  offers multimedia sensor signal processing to mobile devices so that they no longer have to do all the heavy computation.  ... 
doi:10.17577/ijertv6is020276 fatcat:slmbuy4tcnfz3bfqjc35ilczie

Integration of Cloud computing and Internet of Things: A survey

Alessio Botta, Walter de Donato, Valerio Persico, Antonio Pescapé
2016 Future generations computer systems  
Many works in literature have surveyed Cloud and IoT separately and, more precisely, their main properties, features, underlying technologies, and open issues.  ...  In this paper, we focus our attention on the integration of Cloud and IoT, which is what we call the CloudIoT paradigm.  ...  ACKNOWLEDGEMENTS This work is partially funded by the MIUR projects: PLATINO (P ON 01 01007), SMART HEALTH (P ON 04a2 C), S2-MOVE (P ON 04a3 00058), SIRIO (P ON 01 02425), and art. 11 DM 593/2000 for NM2  ... 
doi:10.1016/j.future.2015.09.021 fatcat:aatr42cbtfautpyo3bqs4yhy6a
« Previous Showing results 1 — 15 out of 2,398 results