Academic literature on the topic 'Cloud Data Security Scheme'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cloud Data Security Scheme.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cloud Data Security Scheme"
Wu, Tong, Xiaochen Ma, and Hailun Yan. "Enabling Privacy-Preserving Data Sharing with Bilateral Access Control for Cloud." Electronics 12, no. 23 (2023): 4798. http://dx.doi.org/10.3390/electronics12234798.
Full textEl Makkaoui, Khalid, Abderrahim Beni-Hssane, and Abdellah Ezzati. "Cloud-ElGamal and Fast Cloud-RSA Homomorphic Schemes for Protecting Data Confidentiality in Cloud Computing." International Journal of Digital Crime and Forensics 11, no. 3 (2019): 90–102. http://dx.doi.org/10.4018/ijdcf.2019070105.
Full textKumar, Anuj, M. L., and Ritika R. "Cloud Data Security using Auditing Scheme." International Journal of Computer Applications 156, no. 8 (2016): 10–15. http://dx.doi.org/10.5120/ijca2016912483.
Full textYashas, BN, GS Nagaraja, and DV Ashoka. "Data Security Implementation Scheme on Cloud Environment." Journal of Web Development and Web Designing 4, no. 3 (2019): 18–22. https://doi.org/10.5281/zenodo.3558474.
Full textGarima, Anand. "DATA SECURITY TECHNIQUE IN CLOUD COMPUTING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 538–44. https://doi.org/10.5281/zenodo.1402460.
Full textYang, Guangcan, Peixuan Li, Ke Xiao, et al. "An Efficient Attribute-Based Encryption Scheme with Data Security Classification in the Multi-Cloud Environment." Electronics 12, no. 20 (2023): 4237. http://dx.doi.org/10.3390/electronics12204237.
Full textXie, Hui Juan, Wei She, and Chang Hao Han. "Shamir's Threshold Scheme to Ensure Security in Cloud Computing Services." Applied Mechanics and Materials 543-547 (March 2014): 3632–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3632.
Full textDr., S. Rajendirakumar. "Secure and Reliable Data Transfer for Cloud Computing with Quantum Key Distribution." Journal of Scholastic Engineering Science and Management 2, no. 4 (2023): 27–34. https://doi.org/10.5281/zenodo.8195541.
Full textAl Attar, Tara, and Mohammed Anwar MOHAMMED. "Fully Homomorphic Encryption Scheme for Securing Cloud Data." UHD Journal of Science and Technology 7, no. 2 (2023): 40–49. http://dx.doi.org/10.21928/uhdjst.v7n2y2023.pp40-49.
Full textZhu, Binrui, Jiameng Sun, Jing Qin, and Jixin Ma. "A Secure Data Sharing Scheme with Designated Server." Security and Communication Networks 2019 (June 27, 2019): 1–16. http://dx.doi.org/10.1155/2019/4268731.
Full textDissertations / Theses on the topic "Cloud Data Security Scheme"
Bartlett, Alex Michael. "SoK: A Practical Cost Comparison Among Provable Data Possession Schemes." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1819.
Full textChenette, Nathan Lee. "Symmetric schemes for efficient range and error-tolerant search on encrypted data." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/48976.
Full textHuang, Xueli. "Achieving Data Privacy and Security in Cloud." Diss., Temple University Libraries, 2016. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/372805.
Full textOduyiga, Adeshola Oyesanya. "Security in Cloud Storage : A Suitable Security Algorithm for Data Protection." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34428.
Full textMaddineni, Venkata Sravan Kumar, and Shivashanker Ragi. "Security Techniques for protecting data in Cloud Computing." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3430.
Full textKaaniche, Nesrine. "Cloud data storage security based on cryptographic mechanisms." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0033/document.
Full textKaaniche, Nesrine. "Cloud data storage security based on cryptographic mechanisms." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0033.
Full textDlamini, Moses Thandokuhle. "Combating Data Leakage in the Cloud." Thesis, University of Pretoria, 2020. http://hdl.handle.net/2263/73245.
Full textHe, Yijun, and 何毅俊. "Protecting security in cloud and distributed environments." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B49617631.
Full textGholami, Ali. "Security and Privacy of Sensitive Data in Cloud Computing." Doctoral thesis, KTH, Parallelldatorcentrum, PDC, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186141.
Full textBooks on the topic "Cloud Data Security Scheme"
Zhang, Yuan, Chunxiang Xu, and Xuemin Sherman Shen. Data Security in Cloud Storage. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4374-6.
Full textDeshpande, Prachi S., Subhash C. Sharma, and Sateesh K. Peddoju. Security and Data Storage Aspect in Cloud Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6089-3.
Full textBub, Udo, and Klaus-Dieter Wolfenstetter, eds. Beherrschbarkeit von Cyber Security, Big Data und Cloud Computing. Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-06413-6.
Full textZbakh, Mostapha, Mohammed Essaaidi, Pierre Manneback, and Chunming Rong, eds. Cloud Computing and Big Data: Technologies, Applications and Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-97719-5.
Full textK, Kokula Krishna Hari, ed. Enhancing Security in Dynamic Public Cloud Data Using Encryption. Association of Scientists, Developers and Faculties, 2016.
Find full textTariq, Muhammad Imran, Valentina Emilia Balas, and Shahzadi Tayyaba. Security and Privacy Trends in Cloud Computing and Big Data. CRC Press, 2022. http://dx.doi.org/10.1201/9781003107286.
Full textInternational Business Machines Corporation. International Technical Support Organization, ed. Managing security and compliance in cloud or virtualized data centers. IBM Corp., International Technical Support Organization], 2013.
Find full textRuthberg, Zella G. Work priority scheme for EDP audit and computer security review. U.S. Dept. of Commerce, National Bureau of Standards, 1986.
Find full textMunir, Kashif. Handbook of research on security considerations in cloud computing. Information Science Reference, 2015.
Find full textZhang, Yuan, Chunxiang Xu, and Xuemin Sherman Shen. Data Security in Cloud Storage. Springer, 2020.
Find full textBook chapters on the topic "Cloud Data Security Scheme"
Guo, Cheng, Pengxu Tian, Yingmo Jie, and Xinyu Tang. "A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data Owners." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00009-7_44.
Full textFu, Zhangjie, and Xinyue Cao. "An Outsourcing Data Storage Scheme Supporting Privacy Preserving and Data Hiding Based on Digital Watermarking." In Cloud Computing and Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48671-0_41.
Full textStanek, Jan, Alessandro Sorniotti, Elli Androulaki, and Lukas Kencl. "A Secure Data Deduplication Scheme for Cloud Storage." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45472-5_8.
Full textLin, Changlu, Fucai Luo, Huaxiong Wang, and Yan Zhu. "A Provable Data Possession Scheme with Data Hierarchy in Cloud." In Information Security and Cryptology. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-38898-4_18.
Full textChen, Yi, Hongxia Wang, Hanzhou Wu, Yanli Chen, and Yong Liu. "A Data Hiding Scheme with High Quality for H.264/AVC Video Streams." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00015-8_9.
Full textJia, Nan, Shaojing Fu, Dongsheng Wang, and Ming Xu. "A Co-occurrence Matrix Based Multi-keyword Ranked Search Scheme over Encrypted Cloud Data." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00006-6_4.
Full textCao, Fang, Yalei Zhang, Bowen An, Heng Yao, and Zhenjun Tang. "An Improved Reversible Data Hiding Scheme with Large Payload Based on Image Local-Complexity." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00015-8_20.
Full textZhang, Chao, Lei Zhang, Junmei Wang, Pingzeng Liu, Yong Zheng, and Wanming Ren. "Based on Data Analysis and JC Retrofit Scheme of Dam Risk Function and the Simulation Experiment." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00021-9_41.
Full textVamshi, A., R. Eswari, and Shivam Dubey. "Public Data Auditing Scheme Using RSA and Blockchain for Cloud Storage." In Security, Privacy and Data Analytics. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3569-7_19.
Full textChang, Tao-Ku, and Cheng-Yen Lu. "An Auditing Scheme for Cloud-Based Checkout Systems." In Security with Intelligent Computing and Big-data Services. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_33.
Full textConference papers on the topic "Cloud Data Security Scheme"
Ma, Wenshuo, Kan Yu, Wenhao Zhang, and Ruinian Wang. "Anti Dynamic Collusion Data Aggregation Scheme in Mobile Crowdsensing." In 2024 2nd International Conference On Mobile Internet, Cloud Computing and Information Security (MICCIS). IEEE, 2024. http://dx.doi.org/10.1109/miccis63508.2024.00017.
Full textKumar, Sanjay, Ajay Kumar, Kumar Abhishek, and Pradeep Kumar Arya. "Enhancing Security and Privacy of Healthcare Data Using Hybrid Cryptographic Scheme for Cloud-Based Environment." In 2025 3rd International Conference on Disruptive Technologies (ICDT). IEEE, 2025. https://doi.org/10.1109/icdt63985.2025.10986454.
Full textSunkireddy, Sravanthi, and Ayad Barsoum. "Remote Data Integrity for Cloud Based Storage System." In SSPC 2016 Greencoat. SSPC, 2016. https://doi.org/10.5006/s2016-00068.
Full textAmbica, V., and A. Viji Amutha Mary. "Two Level Encryption Scheme for Securing Private Data Over Hybrid Cloud." In 2024 2nd International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS). IEEE, 2024. https://doi.org/10.1109/icssas64001.2024.10760466.
Full textYuvarani, R., and R. Mahaveerakannan. "Enhancing Cloud Computing Data Security in Attribute-based Encryption Schemes using Cryptographic Algorithm." In 2024 5th International Conference on Image Processing and Capsule Networks (ICIPCN). IEEE, 2024. http://dx.doi.org/10.1109/icipcn63822.2024.00114.
Full textAzam, Saifaris Azizi Bin Saiful, Syed Farid Syed Adnan, and Muhammad Asyraf Asbullah. "Performance Comparison Of Rabin-p And RSA-OAEP Encryption Scheme In Securing Data On Cloud." In 2024 14th International Conference on System Engineering and Technology (ICSET). IEEE, 2024. https://doi.org/10.1109/icset63729.2024.10774588.
Full textSunil Raj, Y., S. Albert Rabara, and S. Britto Ramesh Kumar. "A Security Architecture for Cloud Data Using Hybrid Security Scheme." In 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT). IEEE, 2022. http://dx.doi.org/10.1109/icssit53264.2022.9716379.
Full textWu, Wei-nong, Yuan-bing Zheng, Bin Wu, and Lie Wu. "A data encryption scheme for cloud storage security." In 2015 2nd International Conference on Wireless Communication and Sensor Network (WCSN 2015). WORLD SCIENTIFIC, 2016. http://dx.doi.org/10.1142/9789813140011_0078.
Full textWang, Huifeng, Zhanhuai Li, Xiaonan Zhao, Chanying Qi, Qinlu He, and Jian Sun. "A scheme to ensure data security of cloud storage." In 2013 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI). IEEE, 2013. http://dx.doi.org/10.1109/soli.2013.6611386.
Full textKaur, Samjot, and Vikas Wasson. "Enhancement in Homomorphic Encryption Scheme for Cloud Data Security." In 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST). IEEE, 2015. http://dx.doi.org/10.1109/ngmast.2015.38.
Full textReports on the topic "Cloud Data Security Scheme"
Chapman, Sam. PPR2021 - Automated Vehicle Safety Assurance - In-use Safety and Security Monitoring - Task 6: Data Privacy. TRL, 2022. http://dx.doi.org/10.58446/dwll8689.
Full textPerren, Will. PPR2022 - Automated Vehicle Safety Assurance - In-use Safety and Security Monitoring - Task 7: Change Control. TRL, 2022. http://dx.doi.org/10.58446/bpdl3309.
Full textPerren, Will, Bryn Balcombe, Ben Simpson, and Kostas Kourantidis. PPR2018 - Automated Vehicle Safety Assurance - In-use Safety and Security Monitoring - Task 3: Safety Monitoring Framework. TRL, 2022. http://dx.doi.org/10.58446/sgxq7004.
Full textPasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full textArmstrong, Beth, Lucy King, Ayla Ibrahimi, Robin Clifford, Mark Jitlal, and Katie Mears. Food Hygiene Rating Scheme (FHRS) - Food and You 2: Wave 4 Key Findings. Food Standards Agency, 2022. http://dx.doi.org/10.46756/sci.fsa.lyx422.
Full textMalone, Matt. Will Canada’s Bill C-8 Impact the Future of EU-Canada Cross-border Data Flows? Balsillie School of International Affairs, 2025. https://doi.org/10.51644/bap74.
Full textSemerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], 2019. http://dx.doi.org/10.31812/123456789/3178.
Full textLeathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.
Full textThe 5th National Global Change Conference; Transformative Futures for Water Security Seminar. Academy of Science of South Africa, 2023. http://dx.doi.org/10.17159/assaf.2023/90.
Full textPayment Systems Report - June of 2021. Banco de la República, 2022. http://dx.doi.org/10.32468/rept-sist-pag.eng.2021.
Full text