A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds
2017
IEEE Transactions on Information Forensics and Security
To address integrity, controllable outsourcing, and origin auditing concerns on outsourced files, we propose an identity-based data outsourcing (IBDO) scheme equipped with desirable features advantageous ...
Second, our IBDO scheme facilitates comprehensive auditing, i.e., our scheme not only permits regular integrity auditing as in existing schemes for securing outsourced data, but also allows to audit the ...
Our Contributions To address the above issues for securing outsourced data in clouds, this paper proposes an identity-based data outsourcing (IBDO) system in a multi-user setting. ...
doi:10.1109/tifs.2016.2646913
fatcat:knrpop37ejhzpkqvp5ktxai5ha
Outsourcing Data based on Key Exchange and File Encryption with Integrity Check
2018
International Journal for Research in Applied Science and Engineering Technology
To address controllable outsourcing, integrity and origin auditing concerns on outsourced files, proposes an Identity Based Data Outsourcing (IBDO) scheme outfitted with attractive highlights worthwhile ...
Second, IBDO scheme facilitates comprehensive auditing, that is, IBDO scheme not just allows regular integrity auditing as in existing schemes for securing outsourced data, yet in addition permits to audit ...
Compared to existing PoS like proposals, this scheme has features like Identity-based outsourcing, comprehensive auditing, and strong security guarantee. ...
doi:10.22214/ijraset.2018.4314
fatcat:j4xl3q5u35hmbhdc47ntqxak64
Cloud Computing Auditing
2018
International Journal of Advanced Computer Science and Applications
Since cloud is an internetbased technology, cloud auditing would be very critical and challengeable in such an environment. ...
This paper focuses on practices related to auditing processes, methods, techniques, standards and frameworks in cloud computing environments. ...
The main differences between risk-based audit and value-added audit are that risk-based audit brings data security, data protection and risk assessment into focus however the concentration of value-added ...
doi:10.14569/ijacsa.2018.091265
fatcat:ny2n6bneofhm5cznx6xqge2lxa
A Comprehensive Survey on Public Auditing for Secure Cloud Storage
2018
International Journal of Engineering & Technology
Advances in encryption & authentication techniques has improved security of data at cloud server(CS) but still it is not providing any certificate or assurance about cloud data to user. ...
Cloud computing is the most popular paradigms used today by Industries & individual users to store data. This outsourcing releases user from capital as well as maintenance cost to own their data. ...
So to maintain identity privacy of each user and block less verification, Homomorphic authenticators with Ring signature [HARS] technique is given in [3] to audit the shared data. ...
doi:10.14419/ijet.v7i2.7.10883
fatcat:gosb7t7dare3rhdfpu4xmo2dwa
ATTRIBUTE-BASED ENCRYPTION SCHEMES FOR BOTH USERSAND CLOUD SERVER
2022
International Journal of Engineering Applied Sciences and Technology
To reduce the operator's cost of decryption and secure the sensitive data from an un trusted party, we have an approach to outsourcing the decipherment of the attribute- based encryption (ABE) scheme to ...
Compared with the existing previous methods, our entire limitations of the cloud server is independent of the user numbers who will be satisfied with this scheme and request this decipherment process. ...
Zhang, ''Identity- based auditing for shared cloud data with efficient and secure sensitive information hiding 1) J. Yu, K. Ren, and C. ...
doi:10.33564/ijeast.2022.v07i05.023
fatcat:4vs2d5uepnajllqtmiz7ymvndm
DeyPoS: Using Revocable Storage Identity-Based Encryption
2017
International Journal for Research in Applied Science and Engineering Technology
But there exists a natural resistance for users to directly outsource the shared data to the cloud server since the data often contain valuable information. ...
It is necessary to place cryptographically enhanced access control on the shared data. Identity-based encryption is a promising cryptographical primitive to build a practical data sharing system. ...
SecCloud introduces an auditing entity with maintenance of a MapReduce cloud, which helps clients generate data tags before uploading as well as audit the integrity of data having been stored in cloud. ...
doi:10.22214/ijraset.2017.3070
fatcat:lo4jtnevarf4vjy7rbwmdvphja
LDVAS: Lattice-Based Designated Verifier Auditing Scheme for Electronic Medical Data in Cloud-Assisted WBANs
2020
IEEE Access
As accurate medical diagnostic analysis is heavily based on outsourced electronic medical data in cloud storage, any corrupted data may lead to fateful consequences. ...
Data auditing contributes to medical data integrity verification, but most of existing data auditing schemes are vulnerable to attackers equipped with practical quantum-computing devices, which are very ...
secure identity-based data outsourcing with public auditing in cloud storage has been proposed in [54] . ...
doi:10.1109/access.2020.2981503
fatcat:pm7tqj7dsrg2jink356lrs56pm
Data Outsourcing with Secure Data Auditing in Cloud Computing
2018
International Journal of Trend in Scientific Research and Development
It impacts the clients to check whether their outsourced data is kept set up without downloading the whole data. ...
On the other hand, remote data trustworthiness checking is furthermore a basic security issue with no attempt at being subtle disseminated stockpiling. ...
Development (IJTSRD) International Open Access Journal Data Outsourcing with Secure Data Auditing in Cloud Computing J. ...
doi:10.31142/ijtsrd12949
fatcat:5cjsvkmounfx3h4dg3dcejuhkq
Data Security and Privacy Protection for Cloud Storage: A Survey
2020
IEEE Access
In this paper, we make a comprehensive review of the literatures on data security and privacy issues, data encryption technology, and applicable countermeasures in cloud storage system. ...
Secondly, we give a detailed analysis on challenges and requirements of data security and privacy protection in cloud storage system. ...
In 2019, Li et al. [57] formalize data integrity auditing based on the Fuzz Identity-based cryptography. ...
doi:10.1109/access.2020.3009876
fatcat:6kcb3junlzhvvcq3qhztumpdqq
A Blockchain-Based Public Auditing Protocol with Self-Certified Public Keys for Cloud Data
2021
Security and Communication Networks
Compared with other public auditing schemes, our scheme based on the self-certified public key system has been improved in storage overhead, communication bandwidth, and verification efficiency. ...
Cloud storage can provide a way to effectively store and manage big data. ...
After data are outsourced to the cloud, users would delete local data and lose the management of outsourced data. erefore, users can use audit technology to remotely verify whether the outsourced data ...
doi:10.1155/2021/6623639
fatcat:xnj3x7nkpjd2leqjde5mxkbqeu
Group-oriented Proofs of Storage
2015
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15
The file owner's identity privacy is preserved against the cloud server while the group manager can trace the one who outsourced any suspicious file for liability investigation. ...
By leveraging the polynomial commitment technique, the proposed GPoS proposal is optimized with constant-size bandwidth consumption in proof of storage by the cloud server. ...
is proposed in identity-based setting, auditability of the outsourced files, and whether the identity of file owner is privacy-preserving against the cloud storage server. ...
doi:10.1145/2714576.2714630
dblp:conf/ccs/WangWQ0HZ15
fatcat:rgtglbmvybhuvd7bxacjy5oe6y
EFFICIENT DATA INTEGRITY AND AUDITING IN CLOUD BY USING BLOCK CHAIN
2020
International Journal of Innovative Research in Computer Science & Technology
Numerous data integrity auditing systems have been implemented to guarantee the quality of the data stored in the cloud. ...
hacking operation and all the respective user data or information will be stored in cloud with maximum security. ...
ACKNOWLEDGMENT I thank our mentor Prof.Chethan Raj C for analyzing the data and advised on all aspects related to cloud storage, data integrity auditing, the other concept and validated the experimental ...
doi:10.21276/ijircst.2020.8.4.9
fatcat:5375uqbzungm3opqzjkv7fhw5i
A Comprehensive Survey on Storage Techniques in Cloud Computing
2015
International Journal of Computer Applications
Privacy Preserving Public Auditing Outsourcing of data ultimately relinquishes the control of data from user and the lot of data is in control of the cloud server. ...
Identity-Based Authentication In Cloud Computing, there is security risk because resources and services are distributed across many clients. ...
doi:10.5120/21801-5109
fatcat:yq6bbpsrird4tbrjanpfxzqugq
An Investigation on the Issues in Cloud Data Security
2013
International Journal of Computer Applications
The outsourced sensitive data an cloud servers are not within the same domain. For securing these sensitive user data in cloud server, at present many cryptographic solutions are available. ...
Cloud computing is one of the most fascinating technologies which attract the users to outsource their data from local to remote cloud servers using Internet. ...
Privacy Enhanced Data Outsourcing in the Cloud In cloud computing, outsourcing data security is more tedious task. ...
doi:10.5120/14083-2082
fatcat:4peb37cdxnhbzejrxuzqo5b6i4
Design of the Security Mechanism for a BPO Cloud Computing Platform
2018
2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS)
In particular we are concerned with the BPO-CCP's virtualization security, cloud data security, access control, user authentication and authorization, and cloud computing auditing. ...
This research is aimed at the complex Business Process Outsourcing Cloud Computing Platform (BPO-CCP) for the banking and insurance industries. ...
The cloud auditing system accesses data in the cloud computing platform as an independent third party. It provides a comprehensive record and audit of the BPO-CCP's own situation. ...
doi:10.1109/icsess.2018.8663713
fatcat:yndfnfp355djtbcnhxfmr4dz3e
« Previous
Showing results 1 — 15 out of 2,778 results