Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








495 Hits in 7.1 sec

Video Data Integrity Verification Method Based on Full Homomorphic Encryption in Cloud System

Ruoshui Liu, Jianghui Liu, Jingjie Zhang, Moli Zhang
2018 International Journal of Digital Multimedia Broadcasting  
This paper details the verification methods for the integrity of video data encrypted using the fully homomorphic crytosystems in the context of cloud computing.  ...  The whole process is based on the analysis of present Remote Data Integrity Checking (RDIC) methods.  ...  This paper studies the integrity of video data in cloud systems, and we propose a method for verification of video data integrity based on full homomorphic encryption.  ... 
doi:10.1155/2018/7543875 fatcat:2r4o3vy7ovdttlzppinmt5czpa

Protection of Big Data Privacy

Abid Mehmood, Iynkaran Natgunanathan, Yong Xiang, Guang Hua, Song Guo
2016 IEEE Access  
Since big data require high computational power and large storage, distributed systems are used. As multiple parties are involved in these systems, the risk of privacy violation is increased.  ...  In recent years, big data have become a hot research topic. The increasing amount of big data also increases the chance of breaching the privacy of individuals.  ...  Popular video sharing websites such as YouTube recommends us videos based on our search history.  ... 
doi:10.1109/access.2016.2558446 fatcat:7zpzpho4areujjfjur3hzgugzy

Cloud Security based on the Homomorphic Encryption

Waleed T Al-Sit, Qussay Al-Jubouri, Hani Al-Zoubi
2019 International Journal of Advanced Computer Science and Applications  
Homomorphic Encryption method in cloud computing is presented in this paper as a solution to increase the security of the data.  ...  By using this method, a client can perform an operation on encrypted data without being decrypted which is the same result as the computation applied to decrypted data.  ...  the full operation. 2) Partially Homomorphic Encryption (PHE), in this type of encryption, only one operation can be performed on encrypted data by either addition or multiplication.  ... 
doi:10.14569/ijacsa.2019.0100838 fatcat:cm37fpfvtneglld5737qejxzh4

Emerging Technologies, Infrastructures, and Applications for Video Streaming over Future Communication Networks

Yuanlong Cao, Yuming Fang, Jiyan Wu, Wei Quan, Kai Wang
2019 International Journal of Digital Multimedia Broadcasting  
Liu et al. presents a novel homomorphic encryption technology-based method for verification of video data integrity. e simulation results show that the proposed method is superior to comparison schemes  ...  in all aspects, and it suggests that the proposed scheme is serving better for the video data integrity verification purpose in the cloud environment. e paper by T.  ...  Liu et al. presents a novel homomorphic encryption technology-based method for verification of video data integrity. e simulation results show that the proposed method is superior to comparison schemes  ... 
doi:10.1155/2019/1294380 fatcat:6f2bi2j5enhehpeu7ab7y63oli

Survey on securing data storage in the cloud

Chun-Ting Huang, Lei Huang, Zhongyuan Qin, Hang Yuan, Lan Zhou, Vijay Varadharajan, C.-C. Jay Kuo
2014 APSIPA Transactions on Signal and Information Processing  
After an overview of the cloud storage system and its security problem, we focus on the key security requirement triad, i.e., data integrity, data confidentiality, and availability.  ...  In this work, we conduct an in-depth survey on recent research activities of cloud storage security in association with cloud computing.  ...  As a paradigm, one can use a homomorphic token with distributed verification to check the integrity of erasure-coded data.  ... 
doi:10.1017/atsip.2014.6 fatcat:i5365o5inzh5hb6yrnhvzbjaqu

The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

Junaid Hassan, Danish Shehzad, Usman Habib, Muhammad Umar Aftab, Muhammad Ahmad, Ramil Kuleev, Manuel Mazzara, Shakeel Ahmad
2022 Computational Intelligence and Neuroscience  
Noncryptographic techniques consist of data splitting, data anonymization, and steganographic techniques, whereas cryptographic techniques consist of encryption, searchable encryption, homomorphic encryption  ...  Preliminary results are based on answers to four research questions.  ...  Another scheme is proposed for keyword search over dynamic encrypted cloud data with a symmetric-key-based verification scheme [142] . (3) Encryption.  ... 
doi:10.1155/2022/8303504 pmid:35712069 pmcid:PMC9197654 fatcat:ptgxx6smbza3pdshqilfah2kwa

A Homomorphic Encryption and Privacy Protection Method Based on Blockchain and Edge Computing

Xiaoyan Yan, Qilin Wu, Youming Sun
2020 Wireless Communications and Mobile Computing  
On one hand, it achieves the security protection and integrity check of cloud data; and on the other hand, it also realizes more extensive secure multiparty computation.  ...  In order to assure the operating efficiency of blockchain and alleviate the computational burden of client, it also introduces the Paillier cryptosystem which supports additive homomorphism.  ...  Homomorphic encryption is a method that computes on encrypted data.  ... 
doi:10.1155/2020/8832341 fatcat:drms655dybdgfmbe5j5dws6bea

Preliminary Experiments of a Real-World Authentication Mechanism Based on Facial Recognition and Fully Homomorphic Encryption

Georgiana Crihan, Luminița Dumitriu, Marian Viorel Crăciun
2024 Applied Sciences  
This paper presents initial research on the design, implementation, and evaluation of a multi-factor authentication mechanism that combines facial recognition with a fully homomorphic encryption algorithm  ...  computer systems, showing promise for deployment and seamless integration into real-world scenarios of network architectures.  ...  In [41] , a privacy-preserving face verification scheme based on fully homomorphic encryption and a garbled circuit is proposed.  ... 
doi:10.3390/app14020718 fatcat:we2fdyzh7fhmnpbrnxkzajthke

A Review on Achieving Cloud Security using Third Party Auditor and Preserving Privacy for Shared Data over Public Cloud

Chakresh Kumar, Dr. Annamalai Giri A. A
2023 International Journal of Advanced Research in Science, Communication and Technology  
This research study achieves substantial breakthroughs in data security, data integrity, and access control in the public cloud.  ...  In the present paper a review related to Achieving Cloud Security using Third Party Auditor and Preserving Privacy for Shared Data over Public Cloudwas done.  ...  However, security issues for cloud data continue to be a bigger priority in terms of external assaults on cloud data that destroy the content and breach the integrity of cloud storage.  ... 
doi:10.48175/ijarsct-12044 fatcat:yvukdlxu5bdszfne3iql34xz4u

Security Analysis of Intelligent System Based on Edge Computing

Yibo Han, Weiwei Zhang, Zheng Zhang, Shahram Babaie
2021 Security and Communication Networks  
, verifies the face by cosine similarity, and introduces a user privacy protection scheme based on secure nearest neighbor algorithm and secret sharing homomorphism technology.  ...  In face recognition time consumption and recognition accuracy, the encryption scheme is basically consistent with the recognition time consumption in plaintext state.  ...  Research on key technologies of CCN-based service deployment, discovery and scheduling optimization in MEC Environment.  ... 
doi:10.1155/2021/1224333 fatcat:goiuhkqcuvf53ahylvf57cw72q

Security and Privacy Aspects in MapReduce on Clouds: A Survey [article]

Philip Derbeko, Shlomi Dolev, Ehud Gudes, Shantanu Sharma
2016 arXiv   pre-print
MapReduce is a programming system for distributed processing large-scale data in an efficient and fault tolerant manner on a private, public, or hybrid cloud.  ...  In order to execute a MapReduce job in public and hybrid clouds, authentication of mappers-reducers, confidentiality of data-computations, integrity of data-computations, and correctness-freshness of the  ...  Verification-based Integrity Assurance Framework (VIAF) [115] builds trust between the master process and each of the mappers, based on replication of tasks and a quiz-based system.  ... 
arXiv:1605.00677v1 fatcat:32i6kmqxinetbe63i7p7fl7glu

Proficient Justification of Data Accuracy for Cloud Storage Using Dual Protection

Deepika. N, Durga. P, Gayathri. N, Murugesan. M
2019 International Journal of Scientific Research in Science and Technology  
It makes the clients check whether their outsourced data is kept intact without downloading the whole data. In our system we are using the own auditing based on the token generation.  ...  The cloud security is one of the essential roles in cloud, here we can preserve our data into cloud storage.  ...  One of the biggest concerns with cloud data storage is that of data integrity verification at untrusted servers.  ... 
doi:10.32628/ijsrst196250 fatcat:4b5txdyby5bbrirnxf2qu47zpu

Privacy-Preserving Cloud Computing: Ecosystem, Life Cycle, Layered Architecture and Future Roadmap [article]

Saeed Ahmadi
2022 arXiv   pre-print
Likewise, privacy in cloud computing is important because it ensures that the integrity of data stored on the cloud maintains intact.  ...  trends in research on this area.  ...  Homomorphic encryption is a method of encryption in which users can do mathematical operations on encrypted data without decryption.  ... 
arXiv:2204.11120v1 fatcat:tx75pckegjgqxg6tiibptiazbi

A STUDY ON USE OF DISTRIBUTED ALGORITHMS DURING DISTRIBUTING THE FILE AND PRACTICING STEGANOGRAPHY

Sarika Hemant Gadekar, Dr. Arpana Bharani
2023 Zenodo  
Data on individuals is often stored in the open Cloud, where it may be accessed by anybody.  ...  The ability to access data from any location is only one of the many benefits of cloud computing, which also includes not having to worry about backups or setting up disaster recovery and business continuity  ...  One method of auditing that may confirm integrity using cryptographic techniques is called Provable Data Possession (PDP).  ... 
doi:10.5281/zenodo.7698989 fatcat:7dx5qbjbkrghfcrra6vidnggly

HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW

Nur Nabila Mohamed, Yusnani Mohd Yussof, Mohammed Ahmed Saleh, Habibah Hashim
2020 Journal of Information and Communication Technology  
In contrast, hashing function generates a unique and fixed-length signature for a message to provide data integrity but the method is only a one-way function which is infeasible to invert.  ...  This technique has grown in importance in computing technologies for banking services, medical systems, transportation and other Internet of Things (IoT)based applications which have been subjected to  ...  to form a huge network and to facilitate identification and management of data, which ultimately provides the full range of services to people everywhere based on the integration of applications.  ... 
doi:10.32890/jict2020.19.3.1 fatcat:dnur6fbzvve4jockrantiqwd5q
« Previous Showing results 1 — 15 out of 495 results