• No results found

Secure Data Storage

Using Steganography for Secure Data Storage in Cloud Computing

Using Steganography for Secure Data Storage in Cloud Computing

... to secure the data stored by user on the cloud and maintain their ...to secure data storage on cloud computing by hide secret English text file in cover English text file by generating ...

5

Secure Data Storage over Cloud Using Content Features Processing

Secure Data Storage over Cloud Using Content Features Processing

... The secure data storage over a cloud in this paper brings suitable way to store and access files provided with confidentiality, integrity and authentication ...the data admin side, data ...

13

A Mechanism for Efficient and Secure Data Storage in Cloud

A Mechanism for Efficient and Secure Data Storage in Cloud

... cloud storage is an application that causes the clients to transfer their information to an associated system of servers where the data can be gotten to from ...as data should be gotten to online ...

5

Efficient and Secure Data Storage in Cloud Computing

Efficient and Secure Data Storage in Cloud Computing

... cloud storage. Cloud storage is simply a term that refers to online space that you can use to store your ...Cloud storage is a service model in which data is maintained, managed and backed up ...

7

Auditing Framework for Secure Data Storage in Cloud

Auditing Framework for Secure Data Storage in Cloud

... cloud storage service provider should base its pricing on how much storage capacity a business has used, how much bandwidth was used to access its data, and the value-added services performed in the ...

6

Secure Data Storage Scheme Using Cryptographic
Techniques in Cloud Computing

Secure Data Storage Scheme Using Cryptographic Techniques in Cloud Computing

... - Data storage security refers to the security of your personal or official work on the storage ...their data on Cloud Server and with passage of your time cloud computing grows in numbers of ...

6

Secure Data Storage in Cloud Computing

Secure Data Storage in Cloud Computing

... Application layer: The Cloud application services deliver software as a service over the internet for eliminating the need to install and run the application on the customer own computers using the simplified maintenance ...

6

Cloud Computing and Secure Data Storage

Cloud Computing and Secure Data Storage

... and secure information ...value. Secure hash functions serve data integrity, non- repudiation and authenticity of the source in conjunction with the digital signature ...serve data integrity ...

6

Secure Data Storage and Retrieval in the Cloud

Secure Data Storage and Retrieval in the Cloud

... their data in cloud and excess them from anywhere when they need the ...his data in a encrypted form and later after the upload send question as encoded ...customer data privacy, and, the customer ...

5

SMDS: Secure Model for Cloud Data Storage

SMDS: Secure Model for Cloud Data Storage

... analyzed data storage correctness issue of Cloud ...user’s data as well integrity verification with low computation cost on ...original data on Cloud ...

5

RELIABLE AND SECURE AUDITING IN CLOUD DATA STORAGE

RELIABLE AND SECURE AUDITING IN CLOUD DATA STORAGE

... and storage capacity as a service to a community of end- ...user's data, software and computation over a network. Cloud storage enables users to remotely store their data and enjoy the ...

6

Efficient and secure outsourcing of genomic data storage

Efficient and secure outsourcing of genomic data storage

... We have described a new efficient strategy that uses pri- vate information retrieval to search genomic variants on a cloud database. This scheme makes use of a new enhanced PIR protocol that we adapt to fit our purpose. ...

14

Optimizing Cloud Storage by Secure Data Deduplication

Optimizing Cloud Storage by Secure Data Deduplication

... the data, multiple replicas created at several places ...increases storage complexity. Data deduplication technique consider a prominent part in cloud ...duplicate data in the ...the ...

5

Secure Data Deduplication and Auditing for Cloud Data Storage

Secure Data Deduplication and Auditing for Cloud Data Storage

... To overcome the problem of traditional encryption technique convergent key mechanism is proposed in a literature[21]. This technique encrypts and/or decrypts the data using convergent key. The convergent key is ...

5

Public auditing with cloud based group user revocation with data integrity

Public auditing with cloud based group user revocation with data integrity

... greatest data, we tend to gift the primary mechanism designed with quantifiability in mind once it involves support auditing information shared among an oversized variety of users in a very privacy-preserving ...

5

Secure Sensitive Data Storage on Bigdata Framework

Secure Sensitive Data Storage on Bigdata Framework

... [6]H. Chen, F. Zhang, C. Chen, Z. Yang, R. Chen, B. Zang, W. Mao, H. Chen, F. Zhang, C. Chen, et al., Tamper- resistant execution in an untrusted operating system using a virtual machine monitor, Technical Report, ...

7

Secure Sensitive Data Sharing On a Big Data and Cloud Platform using Advanced Security System

Secure Sensitive Data Sharing On a Big Data and Cloud Platform using Advanced Security System

... big data and cloud platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data ...However, secure ...

7

Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

... a secure hash function for a particular purpose (for example hashing a block of data to form a small identifier for that block, or hashing a master key to form a sub-key), we propend to the input a tag ...

5

Secure Data Compression Scheme for Scalable Data in Dynamic Data Storage Environments

Secure Data Compression Scheme for Scalable Data in Dynamic Data Storage Environments

... A secure S-box will have the property that changing one input bit will change about half of the output bits on average, exhibiting what is known as the avalanche effect ...

9

A Secured Authorized Data Deduplication in Cloud using Hash based Message Authentication Code

A Secured Authorized Data Deduplication in Cloud using Hash based Message Authentication Code

... of storage data, and provides security to that stored ...reduce storage space and upload bandwidth in cloud storage deduplication has been a well-known ...of storage data and ...

5

Show all 10000 documents...

Related subjects