Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2,778 Hits in 3.0 sec

Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds

Yujue Wang, Qianhong Wu, Bo Qin, Wenchang Shi, Robert H. Deng, Jiankun Hu
2017 IEEE Transactions on Information Forensics and Security  
To address integrity, controllable outsourcing, and origin auditing concerns on outsourced files, we propose an identity-based data outsourcing (IBDO) scheme equipped with desirable features advantageous  ...  Second, our IBDO scheme facilitates comprehensive auditing, i.e., our scheme not only permits regular integrity auditing as in existing schemes for securing outsourced data, but also allows to audit the  ...  Our Contributions To address the above issues for securing outsourced data in clouds, this paper proposes an identity-based data outsourcing (IBDO) system in a multi-user setting.  ... 
doi:10.1109/tifs.2016.2646913 fatcat:knrpop37ejhzpkqvp5ktxai5ha

Outsourcing Data based on Key Exchange and File Encryption with Integrity Check

Anusree. M. P,
2018 International Journal for Research in Applied Science and Engineering Technology  
To address controllable outsourcing, integrity and origin auditing concerns on outsourced files, proposes an Identity Based Data Outsourcing (IBDO) scheme outfitted with attractive highlights worthwhile  ...  Second, IBDO scheme facilitates comprehensive auditing, that is, IBDO scheme not just allows regular integrity auditing as in existing schemes for securing outsourced data, yet in addition permits to audit  ...  Compared to existing PoS like proposals, this scheme has features like Identity-based outsourcing, comprehensive auditing, and strong security guarantee.  ... 
doi:10.22214/ijraset.2018.4314 fatcat:j4xl3q5u35hmbhdc47ntqxak64

Cloud Computing Auditing

Mohammad Moghadasi, Seyed Majid, Gábor Fazekas
2018 International Journal of Advanced Computer Science and Applications  
Since cloud is an internetbased technology, cloud auditing would be very critical and challengeable in such an environment.  ...  This paper focuses on practices related to auditing processes, methods, techniques, standards and frameworks in cloud computing environments.  ...  The main differences between risk-based audit and value-added audit are that risk-based audit brings data security, data protection and risk assessment into focus however the concentration of value-added  ... 
doi:10.14569/ijacsa.2018.091265 fatcat:ny2n6bneofhm5cznx6xqge2lxa

A Comprehensive Survey on Public Auditing for Secure Cloud Storage

Smita Chaudhari, Siva Kumar Pathuri
2018 International Journal of Engineering & Technology  
Advances in encryption & authentication techniques has improved security of data at cloud server(CS) but still it is not providing any certificate or assurance about cloud data to user.  ...  Cloud computing is the most popular paradigms used today by Industries & individual users to store data. This outsourcing releases user from capital as well as maintenance cost to own their data.  ...  So to maintain identity privacy of each user and block less verification, Homomorphic authenticators with Ring signature [HARS] technique is given in [3] to audit the shared data.  ... 
doi:10.14419/ijet.v7i2.7.10883 fatcat:gosb7t7dare3rhdfpu4xmo2dwa

ATTRIBUTE-BASED ENCRYPTION SCHEMES FOR BOTH USERSAND CLOUD SERVER

Rajeshwari Gudlanur, Rakesh S, Akshaya Institute of Technology, Tumkur, Karnataka Visvesvaraya Technological University,
2022 International Journal of Engineering Applied Sciences and Technology  
To reduce the operator's cost of decryption and secure the sensitive data from an un trusted party, we have an approach to outsourcing the decipherment of the attribute- based encryption (ABE) scheme to  ...  Compared with the existing previous methods, our entire limitations of the cloud server is independent of the user numbers who will be satisfied with this scheme and request this decipherment process.  ...  Zhang, ''Identity- based auditing for shared cloud data with efficient and secure sensitive information hiding 1) J. Yu, K. Ren, and C.  ... 
doi:10.33564/ijeast.2022.v07i05.023 fatcat:4vs2d5uepnajllqtmiz7ymvndm

DeyPoS: Using Revocable Storage Identity-Based Encryption

Ashwini S Afre
2017 International Journal for Research in Applied Science and Engineering Technology  
But there exists a natural resistance for users to directly outsource the shared data to the cloud server since the data often contain valuable information.  ...  It is necessary to place cryptographically enhanced access control on the shared data. Identity-based encryption is a promising cryptographical primitive to build a practical data sharing system.  ...  SecCloud introduces an auditing entity with maintenance of a MapReduce cloud, which helps clients generate data tags before uploading as well as audit the integrity of data having been stored in cloud.  ... 
doi:10.22214/ijraset.2017.3070 fatcat:lo4jtnevarf4vjy7rbwmdvphja

LDVAS: Lattice-Based Designated Verifier Auditing Scheme for Electronic Medical Data in Cloud-Assisted WBANs

Xiaojun Zhang, Chao Huang, Yuan Zhang, Jingwei Zhang, Jie Gong
2020 IEEE Access  
As accurate medical diagnostic analysis is heavily based on outsourced electronic medical data in cloud storage, any corrupted data may lead to fateful consequences.  ...  Data auditing contributes to medical data integrity verification, but most of existing data auditing schemes are vulnerable to attackers equipped with practical quantum-computing devices, which are very  ...  secure identity-based data outsourcing with public auditing in cloud storage has been proposed in [54] .  ... 
doi:10.1109/access.2020.2981503 fatcat:pm7tqj7dsrg2jink356lrs56pm

Data Outsourcing with Secure Data Auditing in Cloud Computing

J. Gopinadh
2018 International Journal of Trend in Scientific Research and Development  
It impacts the clients to check whether their outsourced data is kept set up without downloading the whole data.  ...  On the other hand, remote data trustworthiness checking is furthermore a basic security issue with no attempt at being subtle disseminated stockpiling.  ...  Development (IJTSRD) International Open Access Journal Data Outsourcing with Secure Data Auditing in Cloud Computing J.  ... 
doi:10.31142/ijtsrd12949 fatcat:5cjsvkmounfx3h4dg3dcejuhkq

Data Security and Privacy Protection for Cloud Storage: A Survey

Pan Yang, Neal N. Xiong, Jingli Ren
2020 IEEE Access  
In this paper, we make a comprehensive review of the literatures on data security and privacy issues, data encryption technology, and applicable countermeasures in cloud storage system.  ...  Secondly, we give a detailed analysis on challenges and requirements of data security and privacy protection in cloud storage system.  ...  In 2019, Li et al. [57] formalize data integrity auditing based on the Fuzz Identity-based cryptography.  ... 
doi:10.1109/access.2020.3009876 fatcat:6kcb3junlzhvvcq3qhztumpdqq

A Blockchain-Based Public Auditing Protocol with Self-Certified Public Keys for Cloud Data

Hongtao Li, Feng Guo, Lili Wang, Jie Wang, Bo Wang, Chuankun Wu, Yinghui Zhang
2021 Security and Communication Networks  
Compared with other public auditing schemes, our scheme based on the self-certified public key system has been improved in storage overhead, communication bandwidth, and verification efficiency.  ...  Cloud storage can provide a way to effectively store and manage big data.  ...  After data are outsourced to the cloud, users would delete local data and lose the management of outsourced data. erefore, users can use audit technology to remotely verify whether the outsourced data  ... 
doi:10.1155/2021/6623639 fatcat:xnj3x7nkpjd2leqjde5mxkbqeu

Group-oriented Proofs of Storage

Yujue Wang, Qianhong Wu, Bo Qin, Xiaofeng Chen, Xinyi Huang, Yunya Zhou
2015 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15  
The file owner's identity privacy is preserved against the cloud server while the group manager can trace the one who outsourced any suspicious file for liability investigation.  ...  By leveraging the polynomial commitment technique, the proposed GPoS proposal is optimized with constant-size bandwidth consumption in proof of storage by the cloud server.  ...  is proposed in identity-based setting, auditability of the outsourced files, and whether the identity of file owner is privacy-preserving against the cloud storage server.  ... 
doi:10.1145/2714576.2714630 dblp:conf/ccs/WangWQ0HZ15 fatcat:rgtglbmvybhuvd7bxacjy5oe6y

EFFICIENT DATA INTEGRITY AND AUDITING IN CLOUD BY USING BLOCK CHAIN

Prof Chethan Raj C, Shivani M S, Sowjanya D R, Sowmya M T, Tejaswini D R
2020 International Journal of Innovative Research in Computer Science & Technology  
Numerous data integrity auditing systems have been implemented to guarantee the quality of the data stored in the cloud.  ...  hacking operation and all the respective user data or information will be stored in cloud with maximum security.  ...  ACKNOWLEDGMENT I thank our mentor Prof.Chethan Raj C for analyzing the data and advised on all aspects related to cloud storage, data integrity auditing, the other concept and validated the experimental  ... 
doi:10.21276/ijircst.2020.8.4.9 fatcat:5375uqbzungm3opqzjkv7fhw5i

A Comprehensive Survey on Storage Techniques in Cloud Computing

Amol S.Choure, S. M. Bansode
2015 International Journal of Computer Applications  
Privacy Preserving Public Auditing Outsourcing of data ultimately relinquishes the control of data from user and the lot of data is in control of the cloud server.  ...  Identity-Based Authentication In Cloud Computing, there is security risk because resources and services are distributed across many clients.  ... 
doi:10.5120/21801-5109 fatcat:yq6bbpsrird4tbrjanpfxzqugq

An Investigation on the Issues in Cloud Data Security

A. MercyGnanaRani, A. Marimuthu
2013 International Journal of Computer Applications  
The outsourced sensitive data an cloud servers are not within the same domain. For securing these sensitive user data in cloud server, at present many cryptographic solutions are available.  ...  Cloud computing is one of the most fascinating technologies which attract the users to outsource their data from local to remote cloud servers using Internet.  ...  Privacy Enhanced Data Outsourcing in the Cloud In cloud computing, outsourcing data security is more tedious task.  ... 
doi:10.5120/14083-2082 fatcat:4peb37cdxnhbzejrxuzqo5b6i4

Design of the Security Mechanism for a BPO Cloud Computing Platform

Huaihai Hui, Des McLernon, Ali Zaidi
2018 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS)  
In particular we are concerned with the BPO-CCP's virtualization security, cloud data security, access control, user authentication and authorization, and cloud computing auditing.  ...  This research is aimed at the complex Business Process Outsourcing Cloud Computing Platform (BPO-CCP) for the banking and insurance industries.  ...  The cloud auditing system accesses data in the cloud computing platform as an independent third party. It provides a comprehensive record and audit of the BPO-CCP's own situation.  ... 
doi:10.1109/icsess.2018.8663713 fatcat:yndfnfp355djtbcnhxfmr4dz3e
« Previous Showing results 1 — 15 out of 2,778 results