Filters








14,898 Hits in 5.8 sec

Secure Crime Case Summary in Police Station Using Block Chain Technology

Surya Tej KR, Poornima N
<span title="2021-07-01">2021</span> <i title="Technoscience Academy"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cwo66igunvdiplkdqwpqsgzpem" style="color: black;">International Journal of Scientific Research in Computer Science Engineering and Information Technology</a> </i> &nbsp;
The data owner may adapt attribute-based encryption to encrypt the stored information for attaining access control and keeping data secure, in the cloud.  ...  On this basis, this study proposes a case summary sharing scheme which uses ciphertext-based encryption to ensure data confidentiality and access control of crime case summary The officer may encrypt the  ...  The data owner may adapt attribute-based encryption to encrypt the stored information for attaining access control and keeping data secure, in the cloud.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32628/cseit217410">doi:10.32628/cseit217410</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wky734nb35alfc5fvmkckfstce">fatcat:wky734nb35alfc5fvmkckfstce</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210902140520/https://ijsrcseit.com/paper/CSEIT217410.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2f/ce/2fcea3c02a79bca4d3b2c4e756b715012b5fb94b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32628/cseit217410"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Attribute-Based Encryption and Its Application to a Software-Distributed Shared Memory

Oana Stan, Loíc Cudennec, Louis Syoën
<span title="">2020</span> <i title="SCITEPRESS - Science and Technology Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7bjbs63oxffftcpgw45mwyavke" style="color: black;">Proceedings of the 17th International Joint Conference on e-Business and Telecommunications</a> </i> &nbsp;
In this paper we propose to rely on the Attribute-Based Encryption (ABE) techniques to tackle the problem of data security within the Software DSM.  ...  We argue here that their potential deployment onto distributed heterogeneous systems requires new approaches to securely manage access to shared data.  ...  In this position paper, we propose to use the Attribute-Based Encryption paradigm to manage fine grained access control to the shared data.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5220/0009890606250631">doi:10.5220/0009890606250631</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icete/StanCS20.html">dblp:conf/icete/StanCS20</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5ocev5b675g4dox7ct3ic52vai">fatcat:5ocev5b675g4dox7ct3ic52vai</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201107031331/https://hal.archives-ouvertes.fr/hal-02919913/document" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9c/84/9c843c9d302c3f699f4d90c14b32a647088bfad1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5220/0009890606250631"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Quantum Key Distribution (Qkd) And Commodity Security Protocols: Introduction And Integration

Alan Mink, Sheila Frankel, Ray Perlner
<span title="2009-07-31">2009</span> <i title="Zenodo"> Zenodo </i> &nbsp;
We present an overview of quantum key distribution (QKD), a secure key exchange method based on the quantum laws of physics rather than computational complexity.  ...  We also provide an overview of the two most widely used commodity security protocols, IPsec and TLS.  ...  A One-Time Pad could be used to protect the IKE SA's traffic and/or the peers' IPsec-protected data as well as the TLS bulk encryption process.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1239668">doi:10.5281/zenodo.1239668</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xq3j3tzew5gldgbaza4ya5itui">fatcat:xq3j3tzew5gldgbaza4ya5itui</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200112134735/https://zenodo.org/record/1239668/files/0709s9.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/46/b7/46b77116268b9fe992a3d4763a73fbf2d3400157.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1239668"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

A Secured Interoperable Data Exchange Model

A. Bahaa, A. Sayed, L. Elfangary
<span title="">2018</span> <i title="The Science and Information Organization"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2yzw5hsmlfa6bkafwsibbudu64" style="color: black;">International Journal of Advanced Computer Science and Applications</a> </i> &nbsp;
Interoperability enables peer systems to communicate with each other and use the functionality of peer systems effectively.  ...  This paper proposes a new RESTful secured interoperable model for data exchange among different information system.  ...  However, most of the proposed models are based on peer-to-peer communication among information system.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2018.090135">doi:10.14569/ijacsa.2018.090135</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6n4u3xcod5f6pcgztrjcu2wlqa">fatcat:6n4u3xcod5f6pcgztrjcu2wlqa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180720170231/http://thesai.org/Downloads/Volume9No1/Paper_35-A_Secured_Interoperable_Data_Exchange_Model.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e7/dd/e7dd11276f529fbdcf8b98d4f978a19aede5c591.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2018.090135"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Distributed Privilege Enforcement in PACS [chapter]

Christoph Sturm, Ela Hunt, Marc H. Scholl
<span title="">2009</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
PACS uses client-side enforcement to support the replication of confidential data.  ...  To avoid a single point of failure at the time of privilege enforcement, we use threshold cryptography to distribute the enforcement among the participants.  ...  Introduction Peer-to-Peer (P2P) networks are used in many application areas.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-03007-9_10">doi:10.1007/978-3-642-03007-9_10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wqflph2gu5ebfchvcsp6rllxuq">fatcat:wqflph2gu5ebfchvcsp6rllxuq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170815040819/https://kops.uni-konstanz.de/bitstream/handle/123456789/6338/SHS_DAS09.pdf?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/85/6f/856f7141c2dca36260ea0c4560ce46273e32ba4c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-03007-9_10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A New Approach for Security in Cloud Data Storage for IOT Applications Using Hybrid Cryptography Technique [chapter]

Pavithra R, Prathiksha S, Shruthi SG, Bhanumathi M
<span title="2021-11-09">2021</span> <i title="IOS Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ubikuqtgk5gsjplis3d6r2e6k4" style="color: black;">Advances in Parallel Computing</a> </i> &nbsp;
A further advantage of this method is we will be using encryption techniques to encrypt.  ...  This paper proposes a method that allows users to store and access the data securely from cloud storage. This method ensures the security and privacy of data stored on the cloud.  ...  Conclusion We have developed a secure cloud-based data analysis system, which supports data sharing with sensitive information in our system, a file stored in the cloud can be shared and used by others  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/apc210138">doi:10.3233/apc210138</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bgswpkbh2bhijomtcouvnodinu">fatcat:bgswpkbh2bhijomtcouvnodinu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220116194454/https://ebooks.iospress.nl/pdf/doi/10.3233/APC210138" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f4/8f/f48f53286d4d20c030ea68628ce6222cd2072c2e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/apc210138"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Improved Crptographic Algorithm for Secured Peer-to-Peer Communication System

Jude I. Opuh, Bartholomew O. Eke, Edem E. Williams
<span title="2021-06-21">2021</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
peer in this peer-to-peer system using RSA cryptosystem as another security layer.SHA3-1024 was used in extending RSA as it provided added capability in securing the system.  ...  The displayed encrypted and decrypted feedback messages assured security, fulfils proactive and goal directed features of agent in this peer-to-peer system.  ...  of peer-to-peer network, They mentioned that peer-to-peer network is a logical overlay network built on the application of software based IP network.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2021921338">doi:10.5120/ijca2021921338</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zze3yxrwordtvllptmgmdetw7q">fatcat:zze3yxrwordtvllptmgmdetw7q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211203132003/https://www.ijcaonline.org/archives/volume183/number6/opuh-2021-ijca-921338.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3a/38/3a38061ddf674652ba4a8868236b7613a6bc2c5c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2021921338"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Scalable and Secure Group Key Management Method for Secure V2V Communication

Hayotjon Aliev, HyungWon Kim, Sunghyun Choi
<span title="2020-10-28">2020</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/taedaf6aozg7vitz5dpgkojane" style="color: black;">Sensors</a> </i> &nbsp;
, sensor data sharing, and security credentials management services.  ...  Safety applications based on vehicle-to-everything (V2X) communications can significantly enhance road safety and reduce traffic fatalities.  ...  Employing more attributes increases computational overhead in the ABE data encryption and decryption phases. By using strong encryption and decryption based on persistent attributes, Ref.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s20216137">doi:10.3390/s20216137</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/33126693">pmid:33126693</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/movv5iwt2jetnodveirrnftxlu">fatcat:movv5iwt2jetnodveirrnftxlu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201210015835/https://res.mdpi.com/d_attachment/sensors/sensors-20-06137/article_deploy/sensors-20-06137-v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e7/cc/e7cce97c93955bf05fa9c9e481569b5c539c0d03.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s20216137"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Class Based Multi Stage Encryption for Efficient Data Security in Cloud Environment Using Profile Data

Mouleeswaran S.K., Kanya Devi J, Illayaraja
<span title="2019-05-30">2019</span> <i title="IOR Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4ljvzsjwmfhtxfxfygy5tgltsi" style="color: black;">International Journal of Computer Communication and Informatics</a> </i> &nbsp;
According to the user profile, the method restricts the access of user and based on the same, the method defines security measures.  ...  There are number of approaches presented earlier towards performance in data security in cloud. To overcome the issues, a class based multi stage encryption algorithm is presented in this paper.  ...  In [16] , a decentralized approach of attribute based encryption is presented. Similarly in [17] , how the encryption standards has been used for real world applications in detail.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.34256/ijcci1915">doi:10.34256/ijcci1915</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kt2k3g4a5ndidoy7fwyxgbl66e">fatcat:kt2k3g4a5ndidoy7fwyxgbl66e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200529072720/https://sietjournals.com/index.php/ijcci/article/download/34/25" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ac/5a/ac5a0b9697e8a13e682b77f45aa879d104efdb7e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.34256/ijcci1915"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Secure Data Sharing Model Using New Technique for Preserving Privacy

Sanaa Sarahneh, Radwan Tahboub
<span title="2015-12-01">2015</span> <i title="Infonomics Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/nkaggs3w25cyrmwvdfnqfuiidu" style="color: black;">Journal of Internet Technology and Secured Transaction</a> </i> &nbsp;
to secure data sharing model in order to facilitate data sharing among different organizations in different areas. 2.  ...  The use of information technology in different areas began to increase, the exchange and sharing different types of information was required.  ...  It is based on reencryption process and the number of re-encryption keys to be required for sharing is minimized.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.20533/jitst.2046.3723.2015.0054">doi:10.20533/jitst.2046.3723.2015.0054</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/b4jatt6khjc35my7lhcizshcsu">fatcat:b4jatt6khjc35my7lhcizshcsu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180601235808/http://infonomics-society.org/wp-content/uploads/jitst/published-papers/volume-4-2015/Secure-Data-Sharing-Model-Using-New-Technique-for-Preserving-Privacy.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bb/9f/bb9f5a74cefce9d219b9c45596b57876bc4219f6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.20533/jitst.2046.3723.2015.0054"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Distributed and Secure Access Control in P2P Databases [chapter]

Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
<span title="">2010</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The data owner peer decides which data to share and whom to share with by means of such policies, with the data encrypted accordingly.  ...  The intent of peer data management systems (PDMS) is to share as much data as possible.  ...  DTD secure views for XML data have been defined in [28] . The approach, based on DTD annotations and view-based, would not be applicable to our context.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-13739-6_8">doi:10.1007/978-3-642-13739-6_8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zo6djkye6ffdnbum3h3ya6dzle">fatcat:zo6djkye6ffdnbum3h3ya6dzle</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150921203309/http://dl.ifip.org/db/conf/dbsec/dbsec2010/BonifatiLW10.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c1/7e/c17ec2a8bddc04262dcc4191d306b3330312c607.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-13739-6_8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Survey Paper on Attribute Based Encryption in Disruption Tolerant Network

<span title="2016-01-05">2016</span> <i title="International Journal of Science and Research"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/odv46yibm5gf7evzoopmrrqr3q" style="color: black;">International Journal of Science and Research (IJSR)</a> </i> &nbsp;
Attribute based encryption (ABE) gives the secure way for data delivery in Disruption Tolerant Network.  ...  The Cipher text-policy Attribute Based Encryption for secure data retrieval in decentralized Disruption Tolerant Networks (DTNs) where multiple key authorities manage their attributes independently.  ...  Attribute-Based Encryption For Fine-Grained Access Control Of Encrypted Data As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21275/v5i1.nov152617">doi:10.21275/v5i1.nov152617</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/x5zmyy5jzjesbcl2l4dfks2qu4">fatcat:x5zmyy5jzjesbcl2l4dfks2qu4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220225151249/https://www.ijsr.net/archive/v5i1/NOV152617.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9c/c6/9cc68a341b048fb01ff1f895958f0d355862def7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21275/v5i1.nov152617"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey

Jeevitha B., Thriveni J., Venugopal K.
<span title="2016-12-15">2016</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
When we need to store the data on the cloud, the process always begins from indexing it and symmetric encryption key using attribute based encryption.  ...  But still few organizations are not ready to use cloud technology due to lack of security.  ...  Fine-grained Attributes-based Access Control (ASPs) policy is used to select the share documents in public cloud. ACPs are used to manage the keys, outsourced the encrypted data.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2016912513">doi:10.5120/ijca2016912513</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/y2hdci4lkrhkpfwbnykkibvhqi">fatcat:y2hdci4lkrhkpfwbnykkibvhqi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180605052041/https://www.ijcaonline.org/archives/volume156/number12/jeevitha-2016-ijca-912513.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ae/5b/ae5befabeaa314f2068ad6614752aa44b478d5ef.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2016912513"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

OSN: Privacy Preserving Policies

Shahina K Shahina K
<span title="">2013</span> <i title="IOSR Journals"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vabuspdninc75epczdurccts4u" style="color: black;">IOSR Journal of Computer Engineering</a> </i> &nbsp;
OSN enable people to connect with their friends based on sharing details about their personal information, but they present a number of privacy risks to their users.  ...  The main such proposed Safebook is a new approach that tackles the security and privacy problemswith a special emphasis on the privacy of users with respect to the application provider in addition to defense  ...  Persona hides user data with attribute-based encryption (ABE), allowing users to apply fine grained policies over who may view their data.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.9790/0661-1112030">doi:10.9790/0661-1112030</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/chhg3hhmcncr7lkiju5e7fawxq">fatcat:chhg3hhmcncr7lkiju5e7fawxq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602065246/http://www.iosrjournals.org/iosr-jce/papers/Vol11-issue1/D01112030.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cd/84/cd84a7182b9cbc112627027bd37c65009bd42961.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.9790/0661-1112030"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Systematic plan of Blockchain Technology on Security Key

G.Vasukidevi, T. Sethukarasi, Anna Univeristy
<span title="2020-03-05">2020</span> <i title="ESRSA Publications Pvt. Ltd."> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/3j6n6lpsjndinobmibtprywohe" style="color: black;">International Journal of Engineering Research and</a> </i> &nbsp;
In recent decades, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through decentralized, trustless, peer-topeer systems.  ...  This paper also identifies peer-reviewed literature that seeks to apply blockchain for cyber security purposes and presents a systematic analysis of the most commonly approved blockchain security applications  ...  Blockchain ideas and incentivization based on bitcoin Peer to peer data sharing security application.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17577/ijertv9is020377">doi:10.17577/ijertv9is020377</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/iy6jt5zzrff7jhz2db3vmwfcsa">fatcat:iy6jt5zzrff7jhz2db3vmwfcsa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200709035947/https://www.ijert.org/research/a-systematic-plan-of-blockchain-technology-on-security-key-IJERTV9IS020377.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/07/0e/070ed7201215d0f9eea5b6aaef344eb99343e6ab.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17577/ijertv9is020377"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 14,898 results