Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








4,253 Hits in 7.5 sec

An examination on data integrity auditing patterns in cloud computing

T A.Mohanaprakash, J Andrews
2018 International Journal of Engineering & Technology  
Cloud computing is associate accomplishment of assorted styles of services that has attracted several users in today's state of affairs.  ...  Some existing integrity ways will solely serve for statically archived information and a few auditing techniques is used for the dynamically updated information.  ...  It Supports public auditing, Privacy preserving and Batch auditing in the multi cloud but it has no provision for multi-user auditing.  ... 
doi:10.14419/ijet.v7i1.9.9822 fatcat:sb6p5yq5nnc65pzijfq4p2zbpm

EFFICIENT DATA INTEGRITY AND AUDITING IN CLOUD BY USING BLOCK CHAIN

Prof Chethan Raj C, Shivani M S, Sowjanya D R, Sowmya M T, Tejaswini D R
2020 International Journal of Innovative Research in Computer Science & Technology  
Numerous data integrity auditing systems have been implemented to guarantee the quality of the data stored in the cloud.  ...  An individual would like to enroll his private key to create the authenticators for understanding the auditing of data integrity in certain, but not all of the current system.  ...  ACKNOWLEDGMENT I thank our mentor Prof.Chethan Raj C for analyzing the data and advised on all aspects related to cloud storage, data integrity auditing, the other concept and validated the experimental  ... 
doi:10.21276/ijircst.2020.8.4.9 fatcat:5375uqbzungm3opqzjkv7fhw5i

Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey

Abdul Razaque, Mohamed Ben Haj Frej, Bandar Alotaibi, Munif Alotaibi
2021 Electronics  
In this paper, we present the state of the art of cloud computing's privacy-preserving models (PPM) based on a TPA.  ...  Hence, for the sake of reinforcing the trust between cloud clients (CC) and cloud service providers (CSP), as well as safeguarding the CC's data in the cloud, several security paradigms of cloud computing  ...  In addition, the authors would like to thank the deanship of scientific research at Shaqra University for supporting this work. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics10212721 fatcat:c2ii7g47z5avhgh6nl64gjnjkm

Security and Privacy in the Medical Internet of Things: A Review

Wencheng Sun, Zhiping Cai, Yangyang Li, Fang Liu, Shengqun Fang, Guoyan Wang
2018 Security and Communication Networks  
The security and privacy of the data collected from MIoT devices, either during their transmission to a cloud or while stored in a cloud, are major unsolved concerns.  ...  In addition, we make in-depth study on the existing solutions to security and privacy issues, together with the open challenges and research issues for future work.  ...  In addition, most free wireless networks in public place, which have not been certified, are untrusted networks [31] . Lightweight Protocols for Devices.  ... 
doi:10.1155/2018/5978636 fatcat:odfuofjixnf25cdi7haxinhyny

Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review [article]

Abdullah Al-Noman Patwary, Anmin Fu, Ranesh Kumar Naha, Sudheer Kumar Battula, Saurabh Garg, Md Anwarul Kaium Patwary, Erfan Aghasian
2020 arXiv   pre-print
Fog is highly distributed and consists of a wide number of autonomous end devices, which contribute to the processing. However, the variety of devices offered across different users are not audited.  ...  Therefore, trust and privacy is also a key challenge to gain market adoption for Fog.  ...  [148] proposed an auditing system for data storage security by implementing a privacy-preserving auditing protocol using homomorphic authentication and random mask techniques for the preservation of  ... 
arXiv:2003.00395v1 fatcat:32jta5ijkzb2nfi2hzatz5pbvi

Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control

Abdullah Al-Noman Patwary, Ranesh Kumar Naha, Saurabh Garg, Sudheer Kumar Battula, Md Anwarul Kaium Patwary, Erfan Aghasian, Muhammad Bilal Amin, Aniket Mahanti, Mingwei Gong
2021 Electronics  
On the other hand, privacy preservation for user's data in Fog devices and application data processed in Fog devices is another concern.  ...  Fog is highly distributed and consists of a wide number of autonomous end devices, which contribute to the processing. However, the variety of devices offered across different users are not audited.  ...  [175] proposed an auditing system for data storage security by implementing a privacy-preserving auditing protocol using homomorphic authentication and random mask techniques for the preservation of  ... 
doi:10.3390/electronics10101171 fatcat:h2q4vbw4dja4ho5tbdj4ijbnje

Third-party enabled auditing for uniqueness-based integrity and data sharing with information hiding

J Faritha Banu, Shruti Kirti, T Archana, Utsav Krishna Pandey
2022 International Journal of Health Sciences  
This paper proposes a third-party enabled auditing methodology to ensure data integrity, privacy data sharing and protect against outside attackers in the public cloud.  ...  Among the most essential security measures in cloud is Cloud auditing. It is the process of validating the reliability of data stored in the cloud.  ...  Wang et. al proposed a public auditing system for shared cloud data that preserves anonymity.  ... 
doi:10.53730/ijhs.v6ns2.7373 fatcat:2hzbtcyte5gvreheaapvge6bme

A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges, State of the Art Methods and Future Directions

Rida Qayyum, Department of Computer Science, Government College Women University Sialkot, 51040, Pakistan
2020 International Journal of Wireless and Microwave Technologies  
But privacy is the main concern for a mobile user in the modern era.  ...  Under these privacy metrics, we evaluated the existing approaches that are counting privacy challenge in mobile cloud computing.  ...  Muhammad Usman Ashraf for his continuous support, enthusiasm, insightful, and constructive suggestions throughout the research.  ... 
doi:10.5815/ijwmt.2020.06.05 fatcat:fvrhastw3zdmzfzpbmnefvyeqm

Blockchain-Based Light-Weighted Provable Data Possession for Low Performance Devices

Yining Qi, Zhen Yang, Yubo Luo, Yongfeng Huang, Xing Li
2022 Computers Materials & Continua  
In this paper, we propose a novel blockchain-based light-weighted PDP scheme for low performance devices, with an instance deployed on a cloud server.  ...  With this method, users with low performance devices can employ third party auditors to compute modular exponential operations that accounts for the largest portion of computation overhead in tag generation  ...  Separation of computation overhead makes the protocol a good practice for signature generation for low-performance devices.  ... 
doi:10.32604/cmc.2022.027939 fatcat:y23avf72fndhbna3myhyg6j4ua

Data Management for Future Wireless Networks: Architecture, Privacy Preservation, and Regulation

Xuemin Sherman Shen, Cheng Huang, Dongxiao Liu, Liang Xue, Weihua Zhuang, Rob Sun, Bidi Ying
2021 IEEE Network  
Finally, we identify further research directions for achieving DM with privacy preservation.  ...  Then we summarize existing privacy-preserving techniques in terms of advantages and challenges when being applied to DM.  ...  A practical and lightweight data auditing scheme for DM should achieve privacy preservation, support dynamic data updating, enable batch auditing, and achieve auditing for multiple replicas.  ... 
doi:10.1109/mnet.011.2000666 fatcat:ri3f3ptzh5bw3l6aqfsqtabkxi

DYBACON: An Auditor for Secure Kinetic Cloud Storage

G. Soniya Priyatharsini, P. Visu
2015 Research Journal of Applied Sciences Engineering and Technology  
This study initially sketch a frame for an auditing protocol, then extend the protocol to support dynamic auditing and batch auditing for each multiple clouds and multiple owners.  ...  Cloud server provides a low cost, flexible, location independent platform for storing client's data.  ...  In privacy preserving protocol, data privacy problem is the main challenge.  ... 
doi:10.19026/rjaset.11.1677 fatcat:ce2uncgeq5co3juk6wae34fpuu

Privacy-Preserving Cloud Computing: Ecosystem, Life Cycle, Layered Architecture and Future Roadmap [article]

Saeed Ahmadi
2022 arXiv   pre-print
This survey paper on privacy-preserving cloud computing can help pave the way for future research in related areas.  ...  Privacy-Preserving Cloud Computing is an emerging technology with many applications in various fields.  ...  Privacy-Preserving Infrastructure Privacy-Preserving Physical Layer The authors of [241] state that in order to audit cloud data to check for data integrity, two lightweight auditing protocols can  ... 
arXiv:2204.11120v1 fatcat:tx75pckegjgqxg6tiibptiazbi

A Comprehensive Survey on Security and Privacy for Electronic Health Data

Se-Ra Oh, Young-Duk Seo, Euijong Lee, Young-Gab Kim
2021 International Journal of Environmental Research and Public Health  
In particular, edge and fog computing studies for e-health security and privacy were reviewed since the studies had mostly not been analyzed in other survey papers.  ...  In this paper, to investigate the security and privacy of e-health systems, we identified major components of the modern e-health systems (i.e., e-health data, medical devices, medical networks and edge  ...  [128] then proposed a privacy-preserving identity-based auditing scheme.  ... 
doi:10.3390/ijerph18189668 pmid:34574593 fatcat:nx7rjvy7tfczjbgmmpqgyiajuu

Security and Privacy Based Data Sharing in Cloud Computing

Dr.Prasanna Kumar.R, Porselvan G, Prem Kumar S, Robinlash F
2018 International Journal of Innovative Research in Engineering & Management  
Data sharing in cloud storage is playing major role in Information Communication, since it can provide users with efficient and effective storage services.  ...  Furthermore, the security analysis and performance evaluation show that our proposal is secure and efficient, respectively.  ...  We have seen the possible methods and solutions for implementing the security and privacy in the big data analytics.  ... 
doi:10.21276/ijirem.2018.5.1.9 fatcat:w4ieubijjvaybjrrj22fgtq3p4

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

2015 International Journal of Science and Research (IJSR)  
In this paper, we propose a novel public auditing mechanism for the integrity of shared data with efficient user revocation in mind.  ...  In addition, a public verifier is always able to audit the integrity of shared data without retrieving the entire data from the cloud.  ...  Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud With cloud storage services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users.  ... 
doi:10.21275/v4i11.nov151499 fatcat:kq5zbn5r6zbvtcj3yhb5tcpx44
« Previous Showing results 1 — 15 out of 4,253 results