• No results found

secure data

Secure Data Aggregation Using Mobile Agents in Wireless Sensor Networks

Secure Data Aggregation Using Mobile Agents in Wireless Sensor Networks

... issues, data confidentiality and integrity, in data aggregation become vital when the sensor network is deployed in a hostile ...for secure data aggregation in sensor ...maintain data ...

5

Secure Data Transmission

Secure Data Transmission

... of data by using different security algorithms, which leads to increasing security of the communication ...during data transmission, we have proposed the method of using both the techniques cryptography, ...

6

Secure Cloud using Secure Data Deduplication Scheme

Secure Cloud using Secure Data Deduplication Scheme

... the data which is common between users to increase the speed of backups, and reduce the storage ...Meta data for the children, and the encryption/hash keys for each ...

7

SECRBAC: Secure Data In The Clouds

SECRBAC: Secure Data In The Clouds

... The server farms utilized by cloud suppliers may likewise be liable to consistence necessities. Utilizing a cloud specialist co-op (CSP) can prompt extra security worries around information ward since client or occupant ...

12

User Data Recovery and Secure Data Distribution in the Cloud

User Data Recovery and Secure Data Distribution in the Cloud

... huge data on data centre and according to the requirements of the customer these data centre virtualized the resources and expose them as the storage pools that help user to store data files ...

5

A Novel Technique For Secure Data Transmission Using Cryptography And Steganography

A Novel Technique For Secure Data Transmission Using Cryptography And Steganography

... embedding, data embedding and data extraction into one ...embedding, data embedding and data ...watermark data to the original host image using the new fragile watermarking ...is ...

5

Secure Data Deduplication and Auditing for Cloud Data Storage

Secure Data Deduplication and Auditing for Cloud Data Storage

... of data is stored on ...for data storage. End user tries to outsource the data maintenance task to the cloud ...of data storage, space availability for large scale data and data ...

5

Secure Data Deduplication in Cloud

Secure Data Deduplication in Cloud

... to secure remote data in the Cloud using encryption and standard access ...system. Data reliability is actually a very critical issue in a deduplication storage system because there is only one copy ...

8

Secure Data Transmission in MANET

Secure Data Transmission in MANET

... Diffie-Hellman introduced the first Key exchange protocol. Diffie-Hellman does not authenticate the communicating entities itself [10].Diffie-Hellman key exchange protocol is a protocol in cryptography in which ...

6

SECRBAC: SECURE DATA IN THE CLOUDS

SECRBAC: SECURE DATA IN THE CLOUDS

... An information driven approval arrangement has been proposed for the safe assurance of information in the Cloud. SecRBAC permits overseeing approval taking after a lead based approach and gives advanced part based ...

6

An Efficient Model for Secure Data Publishing

An Efficient Model for Secure Data Publishing

... disciplines. Data Publishing is an emerging field in present ...on data analytics to know information about the details of business of different companies or within different branches of the same company to ...

5

A Survey of Various Data Sharing with Secure Data in Cloud

A Survey of Various Data Sharing with Secure Data in Cloud

... the data replaced in the network without modifying ...the data collected through ...the data being transmitted, thus making it impracticable for eavesdroppers to get hold of any valuable information ...

6

Secure Data Storage over Cloud Using Content Features Processing

Secure Data Storage over Cloud Using Content Features Processing

... The secure data storage over a cloud in this paper brings suitable way to store and access files provided with confidentiality, integrity and authentication ...the data admin side, data ...

13

Secure Sharing of Data in the Cloud Environment

Secure Sharing of Data in the Cloud Environment

... The data is decrypted and sent back to the ...Moreover, secure data sharing of data is used by the mobile cloud computing paradigm additionally to standard cloud computing because of the fact ...

5

Secure cloud data storage as a service with minimum cost in cloud environment

Secure cloud data storage as a service with minimum cost in cloud environment

... access data over the cloud and control and detect the inside threat attack. Data owner is not able to control all over their data and security ...and secure data sharing and detect of ...

6

PPHOP survey for manage the inside threat attack detection in cloud storage

PPHOP survey for manage the inside threat attack detection in cloud storage

... access data over the cloud and control and detect the inside threat attack. Data owner is not able to control all over their data and security ...and secure data sharing and detect of ...

7

Secure Sensitive Data Sharing On a Big Data and Cloud Platform using Advanced Security System

Secure Sensitive Data Sharing On a Big Data and Cloud Platform using Advanced Security System

... big data and cloud platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data ...However, secure ...

7

Secure Dynamic Data Aggregation Routing Protocol for Wireless Sensor Networks

Secure Dynamic Data Aggregation Routing Protocol for Wireless Sensor Networks

... false data reports via compromised ...to data sources and achieves secure and reliable ...dynamic data aggregation routing protocol, named DABDR along with the earlier filtering scheme for ...

5

A Secured Authorized Data Deduplication in Cloud using Hash based Message Authentication Code

A Secured Authorized Data Deduplication in Cloud using Hash based Message Authentication Code

... storage data, and provides security to that stored ...storage data and control the damage of stolen data if we decrease the value of that stolen information to the ...

5

Secure Private Data Release In Vertical Partitioned Data

Secure Private Data Release In Vertical Partitioned Data

... preserving data publishing addresses the problem of exposing the sensitive ...partitioned data which guarantees that the other party can’t derive extra information from the answered ...private data ...

6

Show all 10000 documents...

Related subjects