Securing the confidentiality and integrity of cloud computing data

B Hazela, SK Gupta, N Soni, CN Saranya - ECS Transactions, 2022 - iopscience.iop.org
Cloud Service Providers (CSPs) are becoming increasingly popular as the amount of
available digital data continues to grow at an exponential rate. A new set of benefits and …

Lightweight privacy-preserving scheme in Wi-Fi fingerprint-based indoor localization

G Zhang, A Zhang, P Zhao, J Sun - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
Wi-Fi fingerprint-based localization, a common indoor localization technique, plays an
important role in the Internet of Things, supporting a number of mobile applications, eg …

An efficient data flow material model based cloud authentication data security and reduce a cloud storage cost using Index-level Boundary Pattern Convergent …

V Krishnasamy, S Venkatachalam - Materials Today: Proceedings, 2023 - Elsevier
The cloud server stores its unique DE-duplicate data replication cloud storage system as
outsourced only data copies. Deduplication cloud storage audits can verify the integrity of …

K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing

C Ling, W Zhang, H He - Cluster Computing, 2023 - Springer
Efficient privacy-preserving algorithms are used in internet of things (IoT) applications,
virtualization and edge computing environments to decrease the high data disclosure risk …

PRIVACY-PRESERVING IN CLOUD COMPUTING FOR DATA STORAGE SECURITY FRAMEWORK USING REGENERATING HOMOMORPHIC ENCRYPTION

B Anantharam, N Sharma, BK Rani - International Journal of Computer …, 2024 - mylib.in
As the next generation of computing technology, as per customer demand and
requirements, cloud computing offers the flexibility to dynamically add new resources and …

Lightweight Accountable Privacy-Preserving Protocol Allowing the Cloud Client to Audit the Third-Party Auditor for Malicious Activities

M Ben Haj Frej, J Dichter, N Gupta - Applied Sciences, 2019 - mdpi.com
Featured Application The potential application of this work is in the field of cloud computing
based on a third-party auditor. The idea is to provide the cloud client with tools that allow him …

Comparison of privacy-preserving models based on a third-party auditor in cloud computing

MBH Frej, J Dichter, N Gupta - 2019 IEEE Cloud Summit, 2019 - ieeexplore.ieee.org
Cloud computing is emerging as a significant utility service with a focus on outsourcing the
data for individual consumers as well as for organizations. It has drastically transformed the …

Blockchain based Public Auditing Outsourcing for Cloud Storage

Y Lin, J Li, S Kimura, Y Zhang, Y Ji… - 2021 IEEE 27th …, 2021 - ieeexplore.ieee.org
Cloud storage services offer flexible, convenient solutions for business and personal users
to store data. Traditionally, Third Party Auditors (TPAs) are introduced to ensure data …

Multi-level security model for privacy preserving in the cloud workflow scheduling

SS Hammed, B Arunkumar - International Journal of …, 2021 - inderscienceonline.com
The traditional security provisioning is concentrating on the authentication of all the data that
are critical or no critical results in the increase in computational time and cost. Further, the …

A practical conflicting role-based cloud security risk evaluation method

J Han, J Zhan, X Xia, X Fan - Recent Advances in Computer …, 2021 - ingentaconnect.com
Background: Currently, Cloud Service Provider (CSP) or third party usually proposes
principles and methods for cloud security risk evaluation, while cloud users have no choice …