Securing the confidentiality and integrity of cloud computing data
Cloud Service Providers (CSPs) are becoming increasingly popular as the amount of
available digital data continues to grow at an exponential rate. A new set of benefits and …
available digital data continues to grow at an exponential rate. A new set of benefits and …
Lightweight privacy-preserving scheme in Wi-Fi fingerprint-based indoor localization
Wi-Fi fingerprint-based localization, a common indoor localization technique, plays an
important role in the Internet of Things, supporting a number of mobile applications, eg …
important role in the Internet of Things, supporting a number of mobile applications, eg …
An efficient data flow material model based cloud authentication data security and reduce a cloud storage cost using Index-level Boundary Pattern Convergent …
V Krishnasamy, S Venkatachalam - Materials Today: Proceedings, 2023 - Elsevier
The cloud server stores its unique DE-duplicate data replication cloud storage system as
outsourced only data copies. Deduplication cloud storage audits can verify the integrity of …
outsourced only data copies. Deduplication cloud storage audits can verify the integrity of …
K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing
Efficient privacy-preserving algorithms are used in internet of things (IoT) applications,
virtualization and edge computing environments to decrease the high data disclosure risk …
virtualization and edge computing environments to decrease the high data disclosure risk …
PRIVACY-PRESERVING IN CLOUD COMPUTING FOR DATA STORAGE SECURITY FRAMEWORK USING REGENERATING HOMOMORPHIC ENCRYPTION
B Anantharam, N Sharma, BK Rani - International Journal of Computer …, 2024 - mylib.in
As the next generation of computing technology, as per customer demand and
requirements, cloud computing offers the flexibility to dynamically add new resources and …
requirements, cloud computing offers the flexibility to dynamically add new resources and …
Lightweight Accountable Privacy-Preserving Protocol Allowing the Cloud Client to Audit the Third-Party Auditor for Malicious Activities
M Ben Haj Frej, J Dichter, N Gupta - Applied Sciences, 2019 - mdpi.com
Featured Application The potential application of this work is in the field of cloud computing
based on a third-party auditor. The idea is to provide the cloud client with tools that allow him …
based on a third-party auditor. The idea is to provide the cloud client with tools that allow him …
Comparison of privacy-preserving models based on a third-party auditor in cloud computing
Cloud computing is emerging as a significant utility service with a focus on outsourcing the
data for individual consumers as well as for organizations. It has drastically transformed the …
data for individual consumers as well as for organizations. It has drastically transformed the …
Blockchain based Public Auditing Outsourcing for Cloud Storage
Cloud storage services offer flexible, convenient solutions for business and personal users
to store data. Traditionally, Third Party Auditors (TPAs) are introduced to ensure data …
to store data. Traditionally, Third Party Auditors (TPAs) are introduced to ensure data …
Multi-level security model for privacy preserving in the cloud workflow scheduling
SS Hammed, B Arunkumar - International Journal of …, 2021 - inderscienceonline.com
The traditional security provisioning is concentrating on the authentication of all the data that
are critical or no critical results in the increase in computational time and cost. Further, the …
are critical or no critical results in the increase in computational time and cost. Further, the …
A practical conflicting role-based cloud security risk evaluation method
J Han, J Zhan, X Xia, X Fan - Recent Advances in Computer …, 2021 - ingentaconnect.com
Background: Currently, Cloud Service Provider (CSP) or third party usually proposes
principles and methods for cloud security risk evaluation, while cloud users have no choice …
principles and methods for cloud security risk evaluation, while cloud users have no choice …