A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
An examination on data integrity auditing patterns in cloud computing
2018
International Journal of Engineering & Technology
Cloud computing is associate accomplishment of assorted styles of services that has attracted several users in today's state of affairs. ...
Some existing integrity ways will solely serve for statically archived information and a few auditing techniques is used for the dynamically updated information. ...
It Supports public auditing, Privacy preserving and Batch auditing in the multi cloud but it has no provision for multi-user auditing. ...
doi:10.14419/ijet.v7i1.9.9822
fatcat:sb6p5yq5nnc65pzijfq4p2zbpm
EFFICIENT DATA INTEGRITY AND AUDITING IN CLOUD BY USING BLOCK CHAIN
2020
International Journal of Innovative Research in Computer Science & Technology
Numerous data integrity auditing systems have been implemented to guarantee the quality of the data stored in the cloud. ...
An individual would like to enroll his private key to create the authenticators for understanding the auditing of data integrity in certain, but not all of the current system. ...
ACKNOWLEDGMENT I thank our mentor Prof.Chethan Raj C for analyzing the data and advised on all aspects related to cloud storage, data integrity auditing, the other concept and validated the experimental ...
doi:10.21276/ijircst.2020.8.4.9
fatcat:5375uqbzungm3opqzjkv7fhw5i
Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey
2021
Electronics
In this paper, we present the state of the art of cloud computing's privacy-preserving models (PPM) based on a TPA. ...
Hence, for the sake of reinforcing the trust between cloud clients (CC) and cloud service providers (CSP), as well as safeguarding the CC's data in the cloud, several security paradigms of cloud computing ...
In addition, the authors would like to thank the deanship of scientific research at Shaqra University for supporting this work.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/electronics10212721
fatcat:c2ii7g47z5avhgh6nl64gjnjkm
Security and Privacy in the Medical Internet of Things: A Review
2018
Security and Communication Networks
The security and privacy of the data collected from MIoT devices, either during their transmission to a cloud or while stored in a cloud, are major unsolved concerns. ...
In addition, we make in-depth study on the existing solutions to security and privacy issues, together with the open challenges and research issues for future work. ...
In addition, most free wireless networks in public place, which have not been certified, are untrusted networks [31] .
Lightweight Protocols for Devices. ...
doi:10.1155/2018/5978636
fatcat:odfuofjixnf25cdi7haxinhyny
Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review
[article]
2020
arXiv
pre-print
Fog is highly distributed and consists of a wide number of autonomous end devices, which contribute to the processing. However, the variety of devices offered across different users are not audited. ...
Therefore, trust and privacy is also a key challenge to gain market adoption for Fog. ...
[148] proposed an auditing system for data storage security by implementing a privacy-preserving auditing protocol using homomorphic authentication and random mask techniques for the preservation of ...
arXiv:2003.00395v1
fatcat:32jta5ijkzb2nfi2hzatz5pbvi
Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
2021
Electronics
On the other hand, privacy preservation for user's data in Fog devices and application data processed in Fog devices is another concern. ...
Fog is highly distributed and consists of a wide number of autonomous end devices, which contribute to the processing. However, the variety of devices offered across different users are not audited. ...
[175] proposed an auditing system for data storage security by implementing a privacy-preserving auditing protocol using homomorphic authentication and random mask techniques for the preservation of ...
doi:10.3390/electronics10101171
fatcat:h2q4vbw4dja4ho5tbdj4ijbnje
Third-party enabled auditing for uniqueness-based integrity and data sharing with information hiding
2022
International Journal of Health Sciences
This paper proposes a third-party enabled auditing methodology to ensure data integrity, privacy data sharing and protect against outside attackers in the public cloud. ...
Among the most essential security measures in cloud is Cloud auditing. It is the process of validating the reliability of data stored in the cloud. ...
Wang et. al proposed a public auditing system for shared cloud data that preserves anonymity. ...
doi:10.53730/ijhs.v6ns2.7373
fatcat:2hzbtcyte5gvreheaapvge6bme
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges, State of the Art Methods and Future Directions
2020
International Journal of Wireless and Microwave Technologies
But privacy is the main concern for a mobile user in the modern era. ...
Under these privacy metrics, we evaluated the existing approaches that are counting privacy challenge in mobile cloud computing. ...
Muhammad Usman Ashraf for his continuous support, enthusiasm, insightful, and constructive suggestions throughout the research. ...
doi:10.5815/ijwmt.2020.06.05
fatcat:fvrhastw3zdmzfzpbmnefvyeqm
Blockchain-Based Light-Weighted Provable Data Possession for Low Performance Devices
2022
Computers Materials & Continua
In this paper, we propose a novel blockchain-based light-weighted PDP scheme for low performance devices, with an instance deployed on a cloud server. ...
With this method, users with low performance devices can employ third party auditors to compute modular exponential operations that accounts for the largest portion of computation overhead in tag generation ...
Separation of computation overhead makes the protocol a good practice for signature generation for low-performance devices. ...
doi:10.32604/cmc.2022.027939
fatcat:y23avf72fndhbna3myhyg6j4ua
Data Management for Future Wireless Networks: Architecture, Privacy Preservation, and Regulation
2021
IEEE Network
Finally, we identify further research directions for achieving DM with privacy preservation. ...
Then we summarize existing privacy-preserving techniques in terms of advantages and challenges when being applied to DM. ...
A practical and lightweight data auditing scheme for DM should achieve privacy preservation, support dynamic data updating, enable batch auditing, and achieve auditing for multiple replicas. ...
doi:10.1109/mnet.011.2000666
fatcat:ri3f3ptzh5bw3l6aqfsqtabkxi
DYBACON: An Auditor for Secure Kinetic Cloud Storage
2015
Research Journal of Applied Sciences Engineering and Technology
This study initially sketch a frame for an auditing protocol, then extend the protocol to support dynamic auditing and batch auditing for each multiple clouds and multiple owners. ...
Cloud server provides a low cost, flexible, location independent platform for storing client's data. ...
In privacy preserving protocol, data privacy problem is the main challenge. ...
doi:10.19026/rjaset.11.1677
fatcat:ce2uncgeq5co3juk6wae34fpuu
Privacy-Preserving Cloud Computing: Ecosystem, Life Cycle, Layered Architecture and Future Roadmap
[article]
2022
arXiv
pre-print
This survey paper on privacy-preserving cloud computing can help pave the way for future research in related areas. ...
Privacy-Preserving Cloud Computing is an emerging technology with many applications in various fields. ...
Privacy-Preserving Infrastructure
Privacy-Preserving Physical Layer The authors of [241] state that in order to audit cloud data to check for data integrity, two lightweight auditing protocols can ...
arXiv:2204.11120v1
fatcat:tx75pckegjgqxg6tiibptiazbi
A Comprehensive Survey on Security and Privacy for Electronic Health Data
2021
International Journal of Environmental Research and Public Health
In particular, edge and fog computing studies for e-health security and privacy were reviewed since the studies had mostly not been analyzed in other survey papers. ...
In this paper, to investigate the security and privacy of e-health systems, we identified major components of the modern e-health systems (i.e., e-health data, medical devices, medical networks and edge ...
[128] then proposed a privacy-preserving identity-based auditing scheme. ...
doi:10.3390/ijerph18189668
pmid:34574593
fatcat:nx7rjvy7tfczjbgmmpqgyiajuu
Security and Privacy Based Data Sharing in Cloud Computing
2018
International Journal of Innovative Research in Engineering & Management
Data sharing in cloud storage is playing major role in Information Communication, since it can provide users with efficient and effective storage services. ...
Furthermore, the security analysis and performance evaluation show that our proposal is secure and efficient, respectively. ...
We have seen the possible methods and solutions for implementing the security and privacy in the big data analytics. ...
doi:10.21276/ijirem.2018.5.1.9
fatcat:w4ieubijjvaybjrrj22fgtq3p4
Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud
2015
International Journal of Science and Research (IJSR)
In this paper, we propose a novel public auditing mechanism for the integrity of shared data with efficient user revocation in mind. ...
In addition, a public verifier is always able to audit the integrity of shared data without retrieving the entire data from the cloud. ...
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud With cloud storage services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. ...
doi:10.21275/v4i11.nov151499
fatcat:kq5zbn5r6zbvtcj3yhb5tcpx44
« Previous
Showing results 1 — 15 out of 4,253 results