A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Video Data Integrity Verification Method Based on Full Homomorphic Encryption in Cloud System
2018
International Journal of Digital Multimedia Broadcasting
This paper details the verification methods for the integrity of video data encrypted using the fully homomorphic crytosystems in the context of cloud computing. ...
The whole process is based on the analysis of present Remote Data Integrity Checking (RDIC) methods. ...
This paper studies the integrity of video data in cloud systems, and we propose a method for verification of video data integrity based on full homomorphic encryption. ...
doi:10.1155/2018/7543875
fatcat:2r4o3vy7ovdttlzppinmt5czpa
Protection of Big Data Privacy
2016
IEEE Access
Since big data require high computational power and large storage, distributed systems are used. As multiple parties are involved in these systems, the risk of privacy violation is increased. ...
In recent years, big data have become a hot research topic. The increasing amount of big data also increases the chance of breaching the privacy of individuals. ...
Popular video sharing websites such as YouTube recommends us videos based on our search history. ...
doi:10.1109/access.2016.2558446
fatcat:7zpzpho4areujjfjur3hzgugzy
Cloud Security based on the Homomorphic Encryption
2019
International Journal of Advanced Computer Science and Applications
Homomorphic Encryption method in cloud computing is presented in this paper as a solution to increase the security of the data. ...
By using this method, a client can perform an operation on encrypted data without being decrypted which is the same result as the computation applied to decrypted data. ...
the full operation. 2) Partially Homomorphic Encryption (PHE), in this type of encryption, only one operation can be performed on encrypted data by either addition or multiplication. ...
doi:10.14569/ijacsa.2019.0100838
fatcat:cm37fpfvtneglld5737qejxzh4
Emerging Technologies, Infrastructures, and Applications for Video Streaming over Future Communication Networks
2019
International Journal of Digital Multimedia Broadcasting
Liu et al. presents a novel homomorphic encryption technology-based method for verification of video data integrity. e simulation results show that the proposed method is superior to comparison schemes ...
in all aspects, and it suggests that the proposed scheme is serving better for the video data integrity verification purpose in the cloud environment. e paper by T. ...
Liu et al. presents a novel homomorphic encryption technology-based method for verification of video data integrity. e simulation results show that the proposed method is superior to comparison schemes ...
doi:10.1155/2019/1294380
fatcat:6f2bi2j5enhehpeu7ab7y63oli
Survey on securing data storage in the cloud
2014
APSIPA Transactions on Signal and Information Processing
After an overview of the cloud storage system and its security problem, we focus on the key security requirement triad, i.e., data integrity, data confidentiality, and availability. ...
In this work, we conduct an in-depth survey on recent research activities of cloud storage security in association with cloud computing. ...
As a paradigm, one can use a homomorphic token with distributed verification to check the integrity of erasure-coded data. ...
doi:10.1017/atsip.2014.6
fatcat:i5365o5inzh5hb6yrnhvzbjaqu
The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)
2022
Computational Intelligence and Neuroscience
Noncryptographic techniques consist of data splitting, data anonymization, and steganographic techniques, whereas cryptographic techniques consist of encryption, searchable encryption, homomorphic encryption ...
Preliminary results are based on answers to four research questions. ...
Another scheme is proposed for keyword search over dynamic encrypted cloud data with a symmetric-key-based verification scheme [142] . (3) Encryption. ...
doi:10.1155/2022/8303504
pmid:35712069
pmcid:PMC9197654
fatcat:ptgxx6smbza3pdshqilfah2kwa
A Homomorphic Encryption and Privacy Protection Method Based on Blockchain and Edge Computing
2020
Wireless Communications and Mobile Computing
On one hand, it achieves the security protection and integrity check of cloud data; and on the other hand, it also realizes more extensive secure multiparty computation. ...
In order to assure the operating efficiency of blockchain and alleviate the computational burden of client, it also introduces the Paillier cryptosystem which supports additive homomorphism. ...
Homomorphic encryption is a method that computes on encrypted data. ...
doi:10.1155/2020/8832341
fatcat:drms655dybdgfmbe5j5dws6bea
Preliminary Experiments of a Real-World Authentication Mechanism Based on Facial Recognition and Fully Homomorphic Encryption
2024
Applied Sciences
This paper presents initial research on the design, implementation, and evaluation of a multi-factor authentication mechanism that combines facial recognition with a fully homomorphic encryption algorithm ...
computer systems, showing promise for deployment and seamless integration into real-world scenarios of network architectures. ...
In [41] , a privacy-preserving face verification scheme based on fully homomorphic encryption and a garbled circuit is proposed. ...
doi:10.3390/app14020718
fatcat:we2fdyzh7fhmnpbrnxkzajthke
A Review on Achieving Cloud Security using Third Party Auditor and Preserving Privacy for Shared Data over Public Cloud
2023
International Journal of Advanced Research in Science, Communication and Technology
This research study achieves substantial breakthroughs in data security, data integrity, and access control in the public cloud. ...
In the present paper a review related to Achieving Cloud Security using Third Party Auditor and Preserving Privacy for Shared Data over Public Cloudwas done. ...
However, security issues for cloud data continue to be a bigger priority in terms of external assaults on cloud data that destroy the content and breach the integrity of cloud storage. ...
doi:10.48175/ijarsct-12044
fatcat:yvukdlxu5bdszfne3iql34xz4u
Security Analysis of Intelligent System Based on Edge Computing
2021
Security and Communication Networks
, verifies the face by cosine similarity, and introduces a user privacy protection scheme based on secure nearest neighbor algorithm and secret sharing homomorphism technology. ...
In face recognition time consumption and recognition accuracy, the encryption scheme is basically consistent with the recognition time consumption in plaintext state. ...
Research on key technologies of CCN-based service deployment, discovery and scheduling optimization in MEC Environment. ...
doi:10.1155/2021/1224333
fatcat:goiuhkqcuvf53ahylvf57cw72q
Security and Privacy Aspects in MapReduce on Clouds: A Survey
[article]
2016
arXiv
pre-print
MapReduce is a programming system for distributed processing large-scale data in an efficient and fault tolerant manner on a private, public, or hybrid cloud. ...
In order to execute a MapReduce job in public and hybrid clouds, authentication of mappers-reducers, confidentiality of data-computations, integrity of data-computations, and correctness-freshness of the ...
Verification-based Integrity Assurance Framework (VIAF) [115] builds trust between the master process and each of the mappers, based on replication of tasks and a quiz-based system. ...
arXiv:1605.00677v1
fatcat:32i6kmqxinetbe63i7p7fl7glu
Proficient Justification of Data Accuracy for Cloud Storage Using Dual Protection
2019
International Journal of Scientific Research in Science and Technology
It makes the clients check whether their outsourced data is kept intact without downloading the whole data. In our system we are using the own auditing based on the token generation. ...
The cloud security is one of the essential roles in cloud, here we can preserve our data into cloud storage. ...
One of the biggest concerns with cloud data storage is that of data integrity verification at untrusted servers. ...
doi:10.32628/ijsrst196250
fatcat:4b5txdyby5bbrirnxf2qu47zpu
Privacy-Preserving Cloud Computing: Ecosystem, Life Cycle, Layered Architecture and Future Roadmap
[article]
2022
arXiv
pre-print
Likewise, privacy in cloud computing is important because it ensures that the integrity of data stored on the cloud maintains intact. ...
trends in research on this area. ...
Homomorphic encryption is a method of encryption in which users can do mathematical operations on encrypted data without decryption. ...
arXiv:2204.11120v1
fatcat:tx75pckegjgqxg6tiibptiazbi
A STUDY ON USE OF DISTRIBUTED ALGORITHMS DURING DISTRIBUTING THE FILE AND PRACTICING STEGANOGRAPHY
2023
Zenodo
Data on individuals is often stored in the open Cloud, where it may be accessed by anybody. ...
The ability to access data from any location is only one of the many benefits of cloud computing, which also includes not having to worry about backups or setting up disaster recovery and business continuity ...
One method of auditing that may confirm integrity using cryptographic techniques is called Provable Data Possession (PDP). ...
doi:10.5281/zenodo.7698989
fatcat:7dx5qbjbkrghfcrra6vidnggly
HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW
2020
Journal of Information and Communication Technology
In contrast, hashing function generates a unique and fixed-length signature for a message to provide data integrity but the method is only a one-way function which is infeasible to invert. ...
This technique has grown in importance in computing technologies for banking services, medical systems, transportation and other Internet of Things (IoT)based applications which have been subjected to ...
to form a huge network and to facilitate identification and management of data, which ultimately provides the full range of services to people everywhere based on the integration of applications. ...
doi:10.32890/jict2020.19.3.1
fatcat:dnur6fbzvve4jockrantiqwd5q
« Previous
Showing results 1 — 15 out of 495 results