Named data networking
Named Data Networking (NDN) is one of five projects funded by the US National Science
Foundation under its Future Internet Architecture Program. NDN has its roots in an earlier …
Foundation under its Future Internet Architecture Program. NDN has its roots in an earlier …
Achieving secure, scalable, and fine-grained data access control in cloud computing
Cloud computing is an emerging computing paradigm in which resources of the computing
infrastructure are provided as services over the Internet. As promising as it is, this paradigm …
infrastructure are provided as services over the Internet. As promising as it is, this paradigm …
Achieving secure role-based access control on encrypted data in cloud storage
L Zhou, V Varadharajan… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
With the rapid developments occurring in cloud computing and services, there has been a
growing trend to use the cloud for large-scale data storage. This has raised the important …
growing trend to use the cloud for large-scale data storage. This has raised the important …
Key-aggregate cryptosystem for scalable data sharing in cloud storage
Data sharing is an important functionality in cloud storage. In this paper, we show how to
securely, efficiently, and flexibly share data with others in cloud storage. We describe new …
securely, efficiently, and flexibly share data with others in cloud storage. We describe new …
Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
Online personal health record (PHR) enables patients to manage their own medical records
in a centralized way, which greatly facilitates the storage, access and sharing of personal …
in a centralized way, which greatly facilitates the storage, access and sharing of personal …
Patient controlled encryption: ensuring privacy of electronic medical records
We explore the challenge of preserving patients' privacy in electronic health record systems.
We argue that security in such systems should be enforced via encryption as well as access …
We argue that security in such systems should be enforced via encryption as well as access …
Privacy protection and data security in cloud computing: a survey, challenges, and solutions
PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …
service. In recent years, there are many research schemes of cloud computing privacy …
[PDF][PDF] Over-encryption: Management of access control evolution on outsourced data
Data outsourcing is emerging today as a successful paradigm allowing users and
organizations to exploit external services for the distribution of resources. A crucial problem …
organizations to exploit external services for the distribution of resources. A crucial problem …
Secure and efficient access to outsourced data
W Wang, Z Li, R Owens, B Bhargava - … of the 2009 ACM workshop on …, 2009 - dl.acm.org
Providing secure and efficient access to large scale outsourced data is an important
component of cloud computing. In this paper, we propose a mechanism to solve this …
component of cloud computing. In this paper, we propose a mechanism to solve this …
Development of modified AES algorithm for data security
P Kumar, SB Rana - Optik, 2016 - Elsevier
Cryptography is a process by which information or messages can be sent from one user to
another user which provides several security services such as confidentiality, data integrity …
another user which provides several security services such as confidentiality, data integrity …