Academic literature on the topic 'Anonymous cloud'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Anonymous cloud.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Anonymous cloud"
Fan, Yi Jie, Zhen Qiao, and Ming Zhong Xiao. "One Cloud: A Secure and Anonymous Multi-Cloud Oblivious Storage Architecture." Applied Mechanics and Materials 556-562 (May 2014): 5591–96. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5591.
Full textZHANG, Yan, Deng-Guo FENG, and Ai-Min YU. "Virtual Machine Anonymous Attestation in Cloud Computing." Journal of Software 24, no. 12 (January 17, 2014): 2897–908. http://dx.doi.org/10.3724/sp.j.1001.2013.04389.
Full textUsha, S., and P. Sangeetha. "Multiple Attribute Authority based Access Control and Anonymous Authentication in Decentralized Cloud." Bonfring International Journal of Data Mining 6, no. 3 (June 30, 2016): 24–29. http://dx.doi.org/10.9756/bijdm.7019.
Full textNing, Zhen-Hu, Wei Jiang, Jing Zhan, and Peng Liang. "Property-Based Anonymous Attestation in Trusted Cloud Computing." Journal of Electrical and Computer Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/687158.
Full textKonan, Martin, and Wenyong Wang. "Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud." International Journal of Information Security and Privacy 12, no. 4 (October 2018): 1–23. http://dx.doi.org/10.4018/ijisp.2018100101.
Full textDongjun Luo. "Efficient Certificateless Anonymous Attestation to Trusted Cloud Computing Platforms." International Journal of Advancements in Computing Technology 4, no. 17 (September 30, 2012): 28–37. http://dx.doi.org/10.4156/ijact.vol4.issue17.4.
Full textB. Amane, Pravin B. More, Yogesh. "Confidential Data Sharing in Cloud using Anonymous Assignment Key." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 02 (February 28, 2015): 950–56. http://dx.doi.org/10.15680/ijircce.2015.0302035.
Full textMorimoto, Yasuhiko, Mohammad Shamsul Arefin, and Mohammad Anisuzzaman Siddique. "Agent-based anonymous skyline set computation in cloud databases." International Journal of Computational Science and Engineering 7, no. 1 (2012): 73. http://dx.doi.org/10.1504/ijcse.2012.046182.
Full textMehmood, Abid, Iynkaran Natgunanathan, Yong Xiang, Howard Poston, and Yushu Zhang. "Anonymous Authentication Scheme for Smart Cloud Based Healthcare Applications." IEEE Access 6 (2018): 33552–67. http://dx.doi.org/10.1109/access.2018.2841972.
Full textShen, Jian, Tianqi Zhou, Xiaofeng Chen, Jin Li, and Willy Susilo. "Anonymous and Traceable Group Data Sharing in Cloud Computing." IEEE Transactions on Information Forensics and Security 13, no. 4 (April 2018): 912–25. http://dx.doi.org/10.1109/tifs.2017.2774439.
Full textDissertations / Theses on the topic "Anonymous cloud"
Amati, Michele. "Design and implementation of an anonymous peer-to-peer iaas cloud." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8426/.
Full textMagnani, Antonio. "Design, implementation and performance evaluation of an anonymous distributed simulator." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10503/.
Full textChuang, Hung Ming, and 莊閎名. "Federated Anonymous Identity Management for Cloud Computing." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/23862051980371450335.
Full text長庚大學
資訊管理學系
101
We proposed a federated identity management for cloud computing, and cloud service providers compose an alliance via the agreement, users can use all provider's service. The third-party cloud trust center is in charge of alliance's maintenance and management. On the other hand, we also provide mutual authentication let users and providers can verify each other's identity legitimacy. In addition, users' personal data store in different providers, the personal data will be hard to guarantee not being disclosed or stolen. The thesis is based on CSA's cloud security guideline that users are anonymous in cloud environment and anonymity can decrease personal privacy data disclosing. The issuer can trace the users real identity to solve the dispute of the anonymous. Our scheme have some features below. (1) Federated identity management, let users single sign-on cloud services . (2) Mutual authentication, to verify each other's identity legitimacy. (3) Anonymous, decreasing personal data being disclosed and stolen by accessing service anonymously. (4) Tracing anonymous, the issuer can trace user's real identity. (5) Non-repudiation, the anonymous can't deny things was done by him. (6) Unforgeable, even the providers know the users' private key, they can't forge users' identity.
Huang, Chien-Jui, and 黃千瑞. "Blockchain Technology for Anonymous Cloud Storage Systems." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/43h869.
Full text國立臺灣科技大學
電機工程系
106
Problems regarding privacy have arisen in recent years due to the rapid development of cloud computing technology. Services such as Google Drive, Dropbox, and Mega are all respectively managed and maintained by a company or organization, which costs heavier agency fees and make them easy targets for cyber attacks. This research aims to improve cloud storage services by using the Anonymous Metadata Separated Cloud Storage System (AMSC). AMSC improves cloud storage systems by utilizing the anonymity and immutability of blockchain. The system allows users to access block chain data via smart contracts, and recognize all users within the application layer equally because it is established on a peer-to-peer network. Users can use a local computer to generate and upload metadata of files and personal key pairs to the blockchain, enabling cloud storage services to read the information on it. The prevention of unauthorized use and sharing of files can be achieved by the verification process of matching creation time of the files and digital signature generated by ECDSA. This study stress tests the performance of uploading and downloading files regarding the three architectures have been mentioned (pure blockchain technology, hybrid blockchain technology with cache, database technology), and record throughput, latency time, and response time for analysis. The analyzed results show the clear superiority of the hybrid blockchain technology relative to the pure blockchain technology with a 500% increase in performance, which is 53.19% of the database technology performance. Through the analysis of performances, this study provides substantiated evidence to claim that the architecture suggested by this study is viable.
Chang, Ya-Chi, and 張雅淇. "Bloom Filter based Research on Anonymous Search Performance on Cloud Service." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/nc3hgf.
Full text國立中央大學
資訊管理學系
106
Nowadays, due to the increasing popularity of cloud services, not only cloud service providers, but also industry players in other industries have begun to collect user information and upload it to the cloud for storage and analysis, in order to provide better user experience services, but collect a large amount of data. At the same time, how to protect the privacy of users is a very important issue. Some studies have proposed to protect user information in an anonymous manner. Based on the Bloom filter, user information in the cloud environment is guaranteed, and the query service can be provided while being anonymous. However, this mechanism has a limitation on the number of data storage, and as the data load increases, the time cost of inserting and searching for data will also increase, resulting in a decrease in performance. Therefore, this study proposes a Decay Value as the usage weight value of each data, and a set of Decay Function to let the attenuation value decay with the custom conditions, when the attenuation value is reduced to At the minimum value, the data is removed from the data sheet to release the location, extending the life of the data sheet and improving its performance. And this research experiment proves that using the Decay Function method, the element insertion time is increased by 1.4 times, and the element query time is increased by 2 times.
Chang, Wei-Lun, and 張瑋倫. "Bloom Filter based Research on Anonymous Protection Mechanism in Cloud Environment." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/25600642754861436083.
Full text國立中央大學
資訊管理學系
105
The popularity of cloud services and the ease with which users enjoy cloud services do not know whether cloud service providers will ask for more information on personal and Android devices (such as IMEI) and then use it without the user's consent Its privacy information for the user profile preferences analysis or information sold to advertisers for profit, this behavior greatly violated the privacy and rights of users. This study provides a mechanism to protect user privacy, so that users do not need to send any identifiable personal information to the cloud when the service is requested, and the cloud service provider is still able to provide the service to the user correctly. But how can cloud service providers quickly identify different users to provide appropriate services in the user's anonymity situation with a large number of different users at the same time? Therefore, this study uses a one-time anonymization code to replace the user-friendly data transmission in the cloud, and then use the Bloom filter to implement this protection mechanism, so that users know whether their services are met. Our innovative use of the hash table with the Bloom filter is advantageous in that the time complexity is O (1) and the Bloom filter has the characteristic of being able to reverse, so that the user is protected by anonymity , It will not consume too much time on this mechanism, and the cloud side is facing the array vector and can not know why the user.
Chang, Tsai-Ling, and 張采菱. "A Study on Anonymous User Authentication and Secure Data Sharing in Cloud." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/20815984203757159201.
Full text國立中興大學
資訊管理學系所
100
In this article, here contains two different part of field, one is introduced the anonymous user authentication protocol, and the other one is talked about the secure data access control in the cloud. When we use the service from Internet, the reliability of communication or trade are all according to the user’s identity can be trust. Therefore, the authentication of user is an extremely important issue. The smart card based user password authentication is a most commonly used solutions to judge the identity of user is legal or not. There already have lots research for these. In this article, we review and point out the security flaw of Song’s protocol, and proposed a new scheme to improve the user anonymity and the user untraceabilty for his protocol. On the other hand, cloud computing is a more important issue in recent years. The popularization of cloud computing can bring lots convenient to clients. However, the cloud environment is not a secure work place. Until now, there still have misgivings about cloud computing. In this chapter, we focus on the security of data sharing and user access control. We have reviewed some scheme about secure data sharing in the cloud, then we point out some advantages and disadvantages of these scheme. Besides, we also proposed our scheme for secure data access control and analysis some secure properties of this scheme.
Peters, Emmanuel Sean. "An Anonymous and Distributed Approach to Improving Privacy in Cloud Computing: An Analysis of Privacy-Preserving Tools & Applications." Thesis, 2017. https://doi.org/10.7916/D8T15G66.
Full textBooks on the topic "Anonymous cloud"
Wang, Ge. Improvisation of the Masses. Edited by Benjamin Piekut and George E. Lewis. Oxford University Press, 2015. http://dx.doi.org/10.1093/oxfordhb/9780199892921.013.15.
Full textBook chapters on the topic "Anonymous cloud"
Sood, Ridhi, and Meenakshi Kalia. "Cloudbank: A Secure Anonymous Banking Cloud." In Communications in Computer and Information Science, 295–304. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14834-7_28.
Full textShen, Yaosheng, Ding Wang, and Ping Wang. "Revisiting Anonymous Two-Factor Authentication Schemes for Cloud Computing." In Cloud Computing and Security, 134–46. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00009-7_13.
Full textMeng, Yitong, Jinlong Fei, Yan Chen, and Yuefei Zhu. "A Domain Name Model of Anonymous Network Hidden Service." In Cloud Computing and Security, 111–22. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00015-8_10.
Full textWang, Xiaoliang, Jianming Jiang, Baowei Wang, and Zhihua Xia. "A VANET Anonymous Authentication Mechanism for Multi-level Application Scenarios." In Cloud Computing and Security, 706–17. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00015-8_61.
Full textPeng, Kun. "Paid and Anonymous Usage of Cloud Software." In Information Security Applications, 308–20. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65299-9_23.
Full textBuccafurri, F., G. Lax, S. Nicolazzo, and A. Nocera. "Accountability-Preserving Anonymous Delivery of Cloud Services." In Trust, Privacy and Security in Digital Business, 124–35. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-22906-5_10.
Full textYassin, Ali A., Hai Jin, Ayad Ibrahim, Weizhong Qiang, and Deqing Zou. "Cloud Authentication Based on Anonymous One-Time Password." In Lecture Notes in Electrical Engineering, 423–31. Dordrecht: Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-5857-5_46.
Full textGreveler, Ulrich, Benjamin Justus, and Dennis Loehr. "Direct Anonymous Attestation: Enhancing Cloud Service User Privacy." In On the Move to Meaningful Internet Systems: OTM 2011, 577–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25106-1_11.
Full textHaböck, Ulrich, and Stephan Krenn. "Breaking and Fixing Anonymous Credentials for the Cloud." In Cryptology and Network Security, 249–69. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31578-8_14.
Full textZhang, Xin, and Fengtong Wen. "An Anonymous User Authentication and Key Distribution Protocol for Heterogenous Wireless Sensor Network." In Cloud Computing and Security, 201–15. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68542-7_17.
Full textConference papers on the topic "Anonymous cloud"
Pacheco, Vinicius, and Ricardo Puttini. "SaaS Anonymous Cloud Service Consumption Structure." In 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops). IEEE, 2012. http://dx.doi.org/10.1109/icdcsw.2012.28.
Full textJensen, Meiko, Sven Schäge, and Jörg Schwenk. "Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing." In 2010 IEEE International Conference on Cloud Computing (CLOUD). IEEE, 2010. http://dx.doi.org/10.1109/cloud.2010.61.
Full textPeters, Emmanuel S., and Nicholas Maxemchuk. "Privacy in the Cloud: Anonymous Tax Preparation." In 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS). IEEE, 2016. http://dx.doi.org/10.1109/bigdatasecurity-hpsc-ids.2016.33.
Full textDjellalbia, Amina, Souad Benmeziane, Nadjib Badache, and Sihem Bensimessaoud. "An adaptive anonymous authentication for cloud environment." In 2015 International Conference on Cloud Technologies and Applications (CloudTech). IEEE, 2015. http://dx.doi.org/10.1109/cloudtech.2015.7337010.
Full text"UNTRACEABLE ANONYMOUS SERVICE CONSUMPTION IN SaaS." In 2nd International Conference on Cloud Computing and Services Science. SciTePress - Science and and Technology Publications, 2012. http://dx.doi.org/10.5220/0003930700960101.
Full textBurattin, Andrea, Mauro Conti, and Daniele Turato. "Toward an Anonymous Process Mining." In 2015 3rd International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2015. http://dx.doi.org/10.1109/ficloud.2015.9.
Full textZhi-hua, Zhang, Li Jian-jun, Jiang Wei, Zhao Yong, and Gong Bei. "An new anonymous authentication scheme for cloud computing." In 2012 7th International Conference on Computer Science & Education (ICCSE 2012). IEEE, 2012. http://dx.doi.org/10.1109/iccse.2012.6295212.
Full textZhang, Manjun, and Yan Zhang. "Certificateless Anonymous User Authentication Protocol for Cloud Computing." In 2015 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS). IEEE, 2015. http://dx.doi.org/10.1109/icitbs.2015.56.
Full textDjellalbia, Amina, Nadjib Badache, Souad Benmeziane, and Sihem Bensimessaoud. "Anonymous authentication scheme in e-Health Cloud environment." In 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2016. http://dx.doi.org/10.1109/icitst.2016.7856664.
Full textZhang, Yong, Xiangxue Li, and Haifeng Qian. "An anonymous remote attestation for trusted cloud computing." In 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems (CCIS). IEEE, 2012. http://dx.doi.org/10.1109/ccis.2012.6664441.
Full text