Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








6,088 Hits in 3.7 sec

A SURVEY: CLOUD COMPUTING SECURITY ISSUES AND TECHNIQUES

R. Ahila
2017 International Journal of Advanced Research in Computer Science  
Nowadays, outsourcing computation has attracted much attention and been researched widely. Cloud storage is one of the most significant services of cloud computing.  ...  Though cloud computing has various advantages to users, it brings new security challenging problems.  ...  A cloud computing auditing scheme was implemented [9] for light weight and privacy preserving secure cloud computing process for group users.  ... 
doi:10.26483/ijarcs.v8i7.4377 fatcat:yl7umbggmbeshbex4tbviak23a

Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications

Xuyun Zhang, Julian Jang-Jaccard, Lianyong Qi, Md Z. A. Bhuiyan, Chang Liu
2018 Security and Communication Networks  
A. Bhuiyan Chang Liu  ...  In the paper entitled "Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud," T.  ...  The research topics include privacy-preserving outsourced auditing, privacypreserving data sharing, privacy-aware data placement, privacy of location-based services, privacy-preserving recommendation,  ... 
doi:10.1155/2018/6238607 fatcat:d3pucb27yvcy5hppgw2j6757lm

Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing

Hongliang Zhu, Meiqi Chen, Maohua Sun, Xin Liao, Lei Hu
2018 Security and Communication Networks  
In recent years, the privacy-preserving outsourcing computation is one of the most common methods to solve the security problems of cloud computing.  ...  In this paper, we introduce a novel privacy-preserving outsourcing computation method which combines GM homomorphic encryption scheme and Bloom filter together to solve this problem and propose a new privacy-preserving  ...  Based on this model, we design a privacy-preserving set intersection outsourcing computation protocol based on GM homomorphic encryption scheme and Bloom filter.  ... 
doi:10.1155/2018/5841967 fatcat:g52ch3icgbfxrmmms4sw6t4yqi

A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment

2023 KSII Transactions on Internet and Information Systems  
its expressiveness, revocation of access rights, policy updating techniques, privacy preservation techniques, fast decryption and computation outsourcing, proxy re-encryption etc.  ...  Cloud computing offers a platform that is both adaptable and scalable, making it ideal for outsourcing data for sharing.  ...  an outsourced ABE scheme using semi trusted cloud server and hidden policy. [31] introduced a privacy preserving MA-ABE scheme.  ... 
doi:10.3837/tiis.2023.01.008 fatcat:pz3ciuntpbdgdpwx6tfreahlny

An Analytical Survey of Privacy Preserving Schemes in Cloud Computing

Saima Majeed
2017 International Journal for Research in Applied Science and Engineering Technology  
This survey paper aims to study and compare various preserving schemes and methods to preserve security in a Cloud environment.  ...  Outsourcing the data gives a big relief for storage of data in local machines. However, there are multifaceted issues with respect to privacy and security of data in a cloud environment.  ...  CONCLUSION In this paper, we have studied the concept of cloud computing and the various privacy preserving schemes in cloud.  ... 
doi:10.22214/ijraset.2017.4081 fatcat:mz4bvjoyaneuljkrvtdnzhnohy

Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing

Qin-long HUANG, Zhao-feng MA, Yi-xian YANG, Jing-yi FU, Xin-xin NIU
2013 Journal of China Universities of Posts and Telecommunications  
In this paper, we propose a secure and privacy-preserving digital rights management (DRM) scheme using homomorphic encryption in cloud computing.  ...  Further, we provide a secure content key distribution scheme based on additive homomorphic probabilistic public key encryption and proxy re-encryption.  ...  However, the proposed scheme requires a trusted cloud computing environment to protect contents and preserve users' privacy.  ... 
doi:10.1016/s1005-8885(13)60113-2 fatcat:63eq5dcazjfk5cikcjpjgh2qby

Some Studies on Protection for the Hidden Attribute Based Signatures without Anonymity Revocation

S. Mahathi, M. Ravindar
2018 International Journal of Trend in Scientific Research and Development  
In this paper, w access control system with privilege separation based on privacy protection. In the PS-ACS scheme, we divide the users into personal domain and public domain logically.  ...  The purpose of this paper is to study of access control scheme to protect users' privacy in cloud environment is of great significance.  ...  In this paper, we propose access control system (PS-ACS), which is privilege separation based on privacy the analysis of cloud environment and the characteristics of the user, we divide the users into  ... 
doi:10.31142/ijtsrd18575 fatcat:ohqqzgczzffv3easc67yut7m74

Public Audit for Cloud Computing Environment: A Review

Tejashri A., Ashish T.
2017 International Journal of Computer Applications  
The paper reviews privacy preserving public audit schemes in cloud computing environment.  ...  Researcher shows keen interest to provide a cloud framework, which preserves the privacy and ensures the integrity of cloud data.  ...  A secure and efficient privacy preserving public auditing scheme is been proposed.  ... 
doi:10.5120/ijca2017913372 fatcat:hndaygbz4bbgbntv4cprp45dee

Data Protection Based On Dynamic Encryption for Secure Cloud Computing

Akash Jain, Prasad Mancharkar, Govinda Mahajan
2014 IOSR Journal of Computer Engineering  
Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a  ...  In this paper, we utilize and uniquely combine the public key based homomorphic authenticator with random masking to achieve the privacy-preserving public cloud data auditing system, which meets all above  ...  Our main scheme to be presented is based on a specific HLA scheme. IV. CONCLUSION In this paper, we propose a privacy-preserving public auditing system for data storage security in Cloud Computing.  ... 
doi:10.9790/0661-16153033 fatcat:sv7m7ugjgjdm3hjtyo6hlbriqy

Study and Analysis of Various Cloud Security, Authentication, and Data Storage Models

Ankush Balaram Pawar, Shashikant U. Ghumbre, Rashmi M. Jogdand
2023 International Journal of Decision Support System Technology  
This review presents a detailed survey of 50 research papers presenting privacy preservation approaches, namely authentication-based, cloud security-based, data storage-based, data security-based, and  ...  The future work of this study is based on the research gaps and problems recognized from present research schemes.  ...  Li et al., (2010) designed a domain-based trust method for the security system in a cloud environment. This method separates cloud providers' resource nodes into identical trust domains.  ... 
doi:10.4018/ijdsst.315760 fatcat:d67wciindjgy3il4yp45aqfbna

Privacy-Preserving Protocol in Multi-User Cloud

Somayeh Sobati
2017 International Journal of Computer Applications  
In this paper, we propose a privacy preserving query protocol based on proxy re-encryption schemes. The proposed protocol protects data privacy of all users in a multi-user cloud setting.  ...  Outsourcing data in the cloud environment has recently gained special attention. However, data privacy remains one of the top concerns for users in cloud outsourcing scenarios.  ...  The BBS scheme is based on ElGamal and uses a group G of prime order q, with generator g.  ... 
doi:10.5120/ijca2017915620 fatcat:2ur3riw6g5ejxmrp3q5s3o7g5u

Analysis of attribute-based cryptographic techniques and their application to protect cloud services

Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh
2019 Transactions on Emerging Telecommunications Technologies  
schemes, w.r.t. supported features, namely security, privacy and functional requirements.  ...  Attribute based cryptography is commonly used to provide encrypted and/or authenticated access to outsourced data in remote servers.  ...  Ruj et al. 73 presented a privacy preserving authenticated access control scheme for securing data in clouds based on an attribute based scheme.  ... 
doi:10.1002/ett.3667 fatcat:eu7rs5halbefrmbiipbf6t7c7e

Security and Privacy-preserving Challenges of e-Health Solutions in Cloud Computing

Shekha Chenthara, Khandakar Ahmed, Hua Wang, Frank Whittaker
2019 IEEE Access  
A systematic and comprehensive review of security and privacy-preserving challenges in e-health solutions indicates various privacy preserving approaches to ensure privacy and security of electronic health  ...  Since big data provide a great mine of information and knowledge in e-Health applications, serious privacy and security challenges that require immediate attention exist.  ...  The proposed scheme relies on homomorphic encryption to guarantee data security, which preserves the privacy of attributes but the computation cost is extremely high.  ... 
doi:10.1109/access.2019.2919982 fatcat:3sawv3nb5ndnncdzzk5q2anuwq

Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey

Abdul Razaque, Mohamed Ben Haj Frej, Bandar Alotaibi, Munif Alotaibi
2021 Electronics  
In this paper, we present the state of the art of cloud computing's privacy-preserving models (PPM) based on a TPA.  ...  based on a third-party auditor (TPA) have been introduced.  ...  Based on Computational Intelligence • A Three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing: In this scheme [63] , a three-layer storage framework  ... 
doi:10.3390/electronics10212721 fatcat:c2ii7g47z5avhgh6nl64gjnjkm

An Investigation on the Issues in Cloud Data Security

A. MercyGnanaRani, A. Marimuthu
2013 International Journal of Computer Applications  
Cloud computing is one of the most fascinating technologies which attract the users to outsource their data from local to remote cloud servers using Internet.  ...  This paper focuses on investigation of cloud data security and its issues. Cloud Computing is one of the most influential technology in the IT industry in recent years.  ...  The TCP provides cloud computing a secure base for achieve trusted computing.  ... 
doi:10.5120/14083-2082 fatcat:4peb37cdxnhbzejrxuzqo5b6i4
« Previous Showing results 1 — 15 out of 6,088 results