Academic literature on the topic 'Cloud Data Security Scheme'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cloud Data Security Scheme.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cloud Data Security Scheme"

1

Wu, Tong, Xiaochen Ma, and Hailun Yan. "Enabling Privacy-Preserving Data Sharing with Bilateral Access Control for Cloud." Electronics 12, no. 23 (2023): 4798. http://dx.doi.org/10.3390/electronics12234798.

Full text
Abstract:
Cloud computing plays an essential role in various fields. However, the existing cloud services face a severe challenge, which is how to share the data among a large scale of devices securely. In this paper, we introduce a cloud-based privacy-preserving data sharing scheme, derived from identity-based matchmaking encryption. In our scheme, the access policies are designed by both the sender and receiver simultaneously, to support bilateral access control. To improve efficiency, we delegate the match algorithm to the cloud server, reducing the computation cost and communication overhead on end
APA, Harvard, Vancouver, ISO, and other styles
2

El Makkaoui, Khalid, Abderrahim Beni-Hssane, and Abdellah Ezzati. "Cloud-ElGamal and Fast Cloud-RSA Homomorphic Schemes for Protecting Data Confidentiality in Cloud Computing." International Journal of Digital Crime and Forensics 11, no. 3 (2019): 90–102. http://dx.doi.org/10.4018/ijdcf.2019070105.

Full text
Abstract:
Homomorphic encryption (HE) is an encryption form that offers a third-party with the ability to carry out computations on encrypted data. This property can be considered as a great solution to get over some obstacles limiting the wide-spread adoption of cloud computing (CC) services. Since CC environments are threatened by insider/outsider security attacks and since CC consumers often access to CC services using resource-limited devices, the HE schemes need to be promoted at security level and at running time to work effectively. For this reason, at EMENA-TSSL'16 and at WINCOM'16, the authors
APA, Harvard, Vancouver, ISO, and other styles
3

Kumar, Anuj, M. L., and Ritika R. "Cloud Data Security using Auditing Scheme." International Journal of Computer Applications 156, no. 8 (2016): 10–15. http://dx.doi.org/10.5120/ijca2016912483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yashas, BN, GS Nagaraja, and DV Ashoka. "Data Security Implementation Scheme on Cloud Environment." Journal of Web Development and Web Designing 4, no. 3 (2019): 18–22. https://doi.org/10.5281/zenodo.3558474.

Full text
Abstract:
<em>Cloud computing usage and its environment is increasing rapidly due to the extensive availability of resources for all end users and professionals to retrieve the data all the time everywhere. However, privacy, the prime concern to do secure searches over the encrypted cloud data is the key factor. This motivated all stakeholders to work on different research domains and its variants under a single owner environment. All cloud servers in a distributed environment support multiple owners to share the benefits brought by cloud computing instead of single ownership. The proposed work manages
APA, Harvard, Vancouver, ISO, and other styles
5

Garima, Anand. "DATA SECURITY TECHNIQUE IN CLOUD COMPUTING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 538–44. https://doi.org/10.5281/zenodo.1402460.

Full text
Abstract:
Cloud computing is the delivery of computing services over the Internet. The platform of cloud computing gives peoples the opportunity of sharing and storing resources and information among the people across the globe. Most of organizations, individual and end users are making use of such online storage services to store their important information for the backup purpose. This new paradigm brings about many new security challenges. At present ensuring security in cloud computing platform has become one of the most significant concerns for the researchers. Many any new frameworks and technologi
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Guangcan, Peixuan Li, Ke Xiao, et al. "An Efficient Attribute-Based Encryption Scheme with Data Security Classification in the Multi-Cloud Environment." Electronics 12, no. 20 (2023): 4237. http://dx.doi.org/10.3390/electronics12204237.

Full text
Abstract:
As an increasing number of people and corporations move their data to the cloud side, how to ensure efficient and secure access to data stored on the cloud side has become a key focus of current research. Attribute-Based Encryption (ABE) is largely recognized as the best access control method for safeguarding the cloud storage environment, and numerous solutions based on ABE have been developed successively. However, the majority of current research is conducted within a single cloud provider, and only the limited number of schemes for the multi-cloud environment also fail to support the data
APA, Harvard, Vancouver, ISO, and other styles
7

Xie, Hui Juan, Wei She, and Chang Hao Han. "Shamir's Threshold Scheme to Ensure Security in Cloud Computing Services." Applied Mechanics and Materials 543-547 (March 2014): 3632–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3632.

Full text
Abstract:
Cloud computing system preserves the security and privacy of a user's data by replicating data among several clouds and by using the secret sharing approach. It uses the database management system DBMS (data source) to manage and control the operations between the clients and them ulti-clouds inside a cloud service provider [1]. Generally speaking, The Shamir's threshold scheme is suitable for the shares in the cloud computing. The Shamir's threshold scheme as a secret sharing scheme will attract more attention in the cloud computing in future.
APA, Harvard, Vancouver, ISO, and other styles
8

Dr., S. Rajendirakumar. "Secure and Reliable Data Transfer for Cloud Computing with Quantum Key Distribution." Journal of Scholastic Engineering Science and Management 2, no. 4 (2023): 27–34. https://doi.org/10.5281/zenodo.8195541.

Full text
Abstract:
<strong>The increasing use of cloud computing has raised concerns about the security of sensitive data. Quantum computers pose a serious threat to the security of traditional encryption schemes, as they could be used to break these schemes in a relatively short amount of time. Quantum cryptography offers a promising solution to this problem, as it provides a secure way to exchange keys that cannot be broken by quantum computers. In this paper, we propose a novel data security scheme for cloud computing that uses quantum key distribution (QKD). The scheme uses a QKD protocol to establish a shar
APA, Harvard, Vancouver, ISO, and other styles
9

Al Attar, Tara, and Mohammed Anwar MOHAMMED. "Fully Homomorphic Encryption Scheme for Securing Cloud Data." UHD Journal of Science and Technology 7, no. 2 (2023): 40–49. http://dx.doi.org/10.21928/uhdjst.v7n2y2023.pp40-49.

Full text
Abstract:
One of the pioneer and important fields in the computer science area is cloud computing. The data within cloud computing are usually transformed to it from local storage; therefore, the security of this data is an important issue. To solve this data security issue, it is important that cloud service providers (CSPs) store encrypted versions of user data. Before transmitting data to the cloud provider, it was encrypted using traditional encryption schemes. Nevertheless, for these schemes, the private key must be provided to the server to be used for the decryption on the other side before any c
APA, Harvard, Vancouver, ISO, and other styles
10

Zhu, Binrui, Jiameng Sun, Jing Qin, and Jixin Ma. "A Secure Data Sharing Scheme with Designated Server." Security and Communication Networks 2019 (June 27, 2019): 1–16. http://dx.doi.org/10.1155/2019/4268731.

Full text
Abstract:
The cloud-assisted Internet of Things (CIoT) is booming, which utilizes powerful data processing capabilities of the cloud platform to solve massive Internet of Things (IoT) data. However, the CIoT faces new security challenges, such as the confidentiality of the outsourced data. Data encryption is a fundamental technique that can guarantee the confidentiality of outsourced data, but it limits target encrypted data retrieval from cloud platform. Public key encryption with keyword search (PEKS) provides a promising solution to address this problem. In PEKS, a cloud server can be authorized to s
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cloud Data Security Scheme"

1

Bartlett, Alex Michael. "SoK: A Practical Cost Comparison Among Provable Data Possession Schemes." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1819.

Full text
Abstract:
Provable Data Possession (PDP) schemes provide users with the ability to efficiently audit and verify the integrity of data stored with potentially unreliable third-parties, such as cloud storage service providers. While dozens of PDP schemes have been developed, no PDP schemes have been practically implemented with an existing cloud service. This work attempts to provide a starting point for the integration of PDP schemes with cloud storage service providers by providing a cost analysis of PDP schemes. This cost analysis is performed by implementing and analyzing five PDP schemes representati
APA, Harvard, Vancouver, ISO, and other styles
2

Chenette, Nathan Lee. "Symmetric schemes for efficient range and error-tolerant search on encrypted data." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/48976.

Full text
Abstract:
Large-scale data management systems rely more and more on cloud storage, where the need for efficient search capabilities clashes with the need for data confidentiality. Encryption and efficient accessibility are naturally at odds, as for instance strong encryption necessitates that ciphertexts reveal nothing about underlying data. Searchable encryption is an active field in cryptography studying encryption schemes that provide varying levels of efficiency, functionality, and security, and efficient searchable encryption focuses on schemes enabling sub-linear (in the size of the database) sear
APA, Harvard, Vancouver, ISO, and other styles
3

Huang, Xueli. "Achieving Data Privacy and Security in Cloud." Diss., Temple University Libraries, 2016. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/372805.

Full text
Abstract:
Computer and Information Science<br>Ph.D.<br>The growing concerns in term of the privacy of data stored in public cloud have restrained the widespread adoption of cloud computing. The traditional method to protect the data privacy is to encrypt data before they are sent to public cloud, but heavy computation is always introduced by this approach, especially for the image and video data, which has much more amount of data than text data. Another way is to take advantage of hybrid cloud by separating the sensitive data from non-sensitive data and storing them in trusted private cloud and un-trus
APA, Harvard, Vancouver, ISO, and other styles
4

Oduyiga, Adeshola Oyesanya. "Security in Cloud Storage : A Suitable Security Algorithm for Data Protection." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34428.

Full text
Abstract:
The purpose of this thesis work was to conduct a general research on existing security techniques and come up with a considerable algorithm for data security in cloud storage. Cloud storage is an infrastructure or is a model of computer data storage in which the digital data is stored in logical pools. It unifies object storage for both developers and enterprises, from live applications data to cloud archival. It help to save valuable space on PC computers or mobile devices and provides the easy storage and access of data anywhere in the world. However, just as the benefits of cloud computing
APA, Harvard, Vancouver, ISO, and other styles
5

Maddineni, Venkata Sravan Kumar, and Shivashanker Ragi. "Security Techniques for protecting data in Cloud Computing." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3430.

Full text
Abstract:
Context: From the past few years, there has been a rapid progress in Cloud Computing. With the increasing number of companies resorting to use resources in the Cloud, there is a necessity for protecting the data of various users using centralized resources. Some major challenges that are being faced by Cloud Computing are to secure, protect and process the data which is the property of the user. Aims and Objectives: The main aim of this research is to understand the security threats and identify the appropriate security techniques used to mitigate them in Cloud Computing. The main objectives o
APA, Harvard, Vancouver, ISO, and other styles
6

Kaaniche, Nesrine. "Cloud data storage security based on cryptographic mechanisms." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0033/document.

Full text
Abstract:
Au cours de la dernière décennie, avec la standardisation d’Internet, le développement des réseaux à haut débit, le paiement à l’usage et la quête sociétale de la mobilité, le monde informatique a vu se populariser un nouveau paradigme, le Cloud. Le recours au cloud est de plus en plus remarquable compte tenu de plusieurs facteurs, notamment ses architectures rentables, prenant en charge la transmission, le stockage et le calcul intensif de données. Cependant, ces services de stockage prometteurs soulèvent la question de la protection des données et de la conformité aux réglementations, consid
APA, Harvard, Vancouver, ISO, and other styles
7

Kaaniche, Nesrine. "Cloud data storage security based on cryptographic mechanisms." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0033.

Full text
Abstract:
Au cours de la dernière décennie, avec la standardisation d’Internet, le développement des réseaux à haut débit, le paiement à l’usage et la quête sociétale de la mobilité, le monde informatique a vu se populariser un nouveau paradigme, le Cloud. Le recours au cloud est de plus en plus remarquable compte tenu de plusieurs facteurs, notamment ses architectures rentables, prenant en charge la transmission, le stockage et le calcul intensif de données. Cependant, ces services de stockage prometteurs soulèvent la question de la protection des données et de la conformité aux réglementations, consid
APA, Harvard, Vancouver, ISO, and other styles
8

Dlamini, Moses Thandokuhle. "Combating Data Leakage in the Cloud." Thesis, University of Pretoria, 2020. http://hdl.handle.net/2263/73245.

Full text
Abstract:
The increasing number of reports on data leakage incidents increasingly erodes the already low consumer confidence in cloud services. Hence, some organisations are still hesitant to fully trust the cloud with their confidential data. Therefore, this study raises a critical and challenging research question: How can we restore the damaged consumer confidence and improve the uptake and security of cloud services? This study makes a plausible attempt at unpacking and answering the research question in order to holistically address the data leakage problem from three fronts, i.e. conflict-aware vi
APA, Harvard, Vancouver, ISO, and other styles
9

He, Yijun, and 何毅俊. "Protecting security in cloud and distributed environments." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B49617631.

Full text
Abstract:
Encryption helps to ensure that information within a session is not compromised. Authentication and access control measures ensure legitimate and appropriate access to information, and prevent inappropriate access to such resources. While encryption, authentication and access control each has its own responsibility in securing a communication session, a combination of these three mechanisms can provide much better protection for information. This thesis addresses encryption, authentication and access control related problems in cloud and distributed environments, since these problems are ver
APA, Harvard, Vancouver, ISO, and other styles
10

Gholami, Ali. "Security and Privacy of Sensitive Data in Cloud Computing." Doctoral thesis, KTH, Parallelldatorcentrum, PDC, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186141.

Full text
Abstract:
Cloud computing offers the prospect of on-demand, elastic computing, provided as a utility service, and it is revolutionizing many domains of computing. Compared with earlier methods of processing data, cloud computing environments provide significant benefits, such as the availability of automated tools to assemble, connect, configure and reconfigure virtualized resources on demand. These make it much easier to meet organizational goals as organizations can easily deploy cloud services. However, the shift in paradigm that accompanies the adoption of cloud computing is increasingly giving rise
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cloud Data Security Scheme"

1

Zhang, Yuan, Chunxiang Xu, and Xuemin Sherman Shen. Data Security in Cloud Storage. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4374-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Deshpande, Prachi S., Subhash C. Sharma, and Sateesh K. Peddoju. Security and Data Storage Aspect in Cloud Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6089-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bub, Udo, and Klaus-Dieter Wolfenstetter, eds. Beherrschbarkeit von Cyber Security, Big Data und Cloud Computing. Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-06413-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zbakh, Mostapha, Mohammed Essaaidi, Pierre Manneback, and Chunming Rong, eds. Cloud Computing and Big Data: Technologies, Applications and Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-97719-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

K, Kokula Krishna Hari, ed. Enhancing Security in Dynamic Public Cloud Data Using Encryption. Association of Scientists, Developers and Faculties, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tariq, Muhammad Imran, Valentina Emilia Balas, and Shahzadi Tayyaba. Security and Privacy Trends in Cloud Computing and Big Data. CRC Press, 2022. http://dx.doi.org/10.1201/9781003107286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

International Business Machines Corporation. International Technical Support Organization, ed. Managing security and compliance in cloud or virtualized data centers. IBM Corp., International Technical Support Organization], 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ruthberg, Zella G. Work priority scheme for EDP audit and computer security review. U.S. Dept. of Commerce, National Bureau of Standards, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Munir, Kashif. Handbook of research on security considerations in cloud computing. Information Science Reference, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Yuan, Chunxiang Xu, and Xuemin Sherman Shen. Data Security in Cloud Storage. Springer, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cloud Data Security Scheme"

1

Guo, Cheng, Pengxu Tian, Yingmo Jie, and Xinyu Tang. "A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data Owners." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00009-7_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fu, Zhangjie, and Xinyue Cao. "An Outsourcing Data Storage Scheme Supporting Privacy Preserving and Data Hiding Based on Digital Watermarking." In Cloud Computing and Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48671-0_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stanek, Jan, Alessandro Sorniotti, Elli Androulaki, and Lukas Kencl. "A Secure Data Deduplication Scheme for Cloud Storage." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45472-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Changlu, Fucai Luo, Huaxiong Wang, and Yan Zhu. "A Provable Data Possession Scheme with Data Hierarchy in Cloud." In Information Security and Cryptology. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-38898-4_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Yi, Hongxia Wang, Hanzhou Wu, Yanli Chen, and Yong Liu. "A Data Hiding Scheme with High Quality for H.264/AVC Video Streams." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00015-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jia, Nan, Shaojing Fu, Dongsheng Wang, and Ming Xu. "A Co-occurrence Matrix Based Multi-keyword Ranked Search Scheme over Encrypted Cloud Data." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00006-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cao, Fang, Yalei Zhang, Bowen An, Heng Yao, and Zhenjun Tang. "An Improved Reversible Data Hiding Scheme with Large Payload Based on Image Local-Complexity." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00015-8_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Chao, Lei Zhang, Junmei Wang, Pingzeng Liu, Yong Zheng, and Wanming Ren. "Based on Data Analysis and JC Retrofit Scheme of Dam Risk Function and the Simulation Experiment." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00021-9_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vamshi, A., R. Eswari, and Shivam Dubey. "Public Data Auditing Scheme Using RSA and Blockchain for Cloud Storage." In Security, Privacy and Data Analytics. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3569-7_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chang, Tao-Ku, and Cheng-Yen Lu. "An Auditing Scheme for Cloud-Based Checkout Systems." In Security with Intelligent Computing and Big-data Services. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cloud Data Security Scheme"

1

Ma, Wenshuo, Kan Yu, Wenhao Zhang, and Ruinian Wang. "Anti Dynamic Collusion Data Aggregation Scheme in Mobile Crowdsensing." In 2024 2nd International Conference On Mobile Internet, Cloud Computing and Information Security (MICCIS). IEEE, 2024. http://dx.doi.org/10.1109/miccis63508.2024.00017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Sanjay, Ajay Kumar, Kumar Abhishek, and Pradeep Kumar Arya. "Enhancing Security and Privacy of Healthcare Data Using Hybrid Cryptographic Scheme for Cloud-Based Environment." In 2025 3rd International Conference on Disruptive Technologies (ICDT). IEEE, 2025. https://doi.org/10.1109/icdt63985.2025.10986454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sunkireddy, Sravanthi, and Ayad Barsoum. "Remote Data Integrity for Cloud Based Storage System." In SSPC 2016 Greencoat. SSPC, 2016. https://doi.org/10.5006/s2016-00068.

Full text
Abstract:
Abstract Cloud computing provides a reliable and robust infrastructure for users to remotely store and access huge amount of data. However, data integrity in the cloud is a major security concern for data owners no longer physically possess their sensitive data. To mitigate this challenge, remote data integrity has been proposed as a mechanism to enable data owners to verify the correctness of their outsourced data. The remote verification process needs to be done with reduced communication, computation and storage overhead. That is why traditional cryptographic primitives for data integrity b
APA, Harvard, Vancouver, ISO, and other styles
4

Ambica, V., and A. Viji Amutha Mary. "Two Level Encryption Scheme for Securing Private Data Over Hybrid Cloud." In 2024 2nd International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS). IEEE, 2024. https://doi.org/10.1109/icssas64001.2024.10760466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yuvarani, R., and R. Mahaveerakannan. "Enhancing Cloud Computing Data Security in Attribute-based Encryption Schemes using Cryptographic Algorithm." In 2024 5th International Conference on Image Processing and Capsule Networks (ICIPCN). IEEE, 2024. http://dx.doi.org/10.1109/icipcn63822.2024.00114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Azam, Saifaris Azizi Bin Saiful, Syed Farid Syed Adnan, and Muhammad Asyraf Asbullah. "Performance Comparison Of Rabin-p And RSA-OAEP Encryption Scheme In Securing Data On Cloud." In 2024 14th International Conference on System Engineering and Technology (ICSET). IEEE, 2024. https://doi.org/10.1109/icset63729.2024.10774588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sunil Raj, Y., S. Albert Rabara, and S. Britto Ramesh Kumar. "A Security Architecture for Cloud Data Using Hybrid Security Scheme." In 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT). IEEE, 2022. http://dx.doi.org/10.1109/icssit53264.2022.9716379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wu, Wei-nong, Yuan-bing Zheng, Bin Wu, and Lie Wu. "A data encryption scheme for cloud storage security." In 2015 2nd International Conference on Wireless Communication and Sensor Network (WCSN 2015). WORLD SCIENTIFIC, 2016. http://dx.doi.org/10.1142/9789813140011_0078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Huifeng, Zhanhuai Li, Xiaonan Zhao, Chanying Qi, Qinlu He, and Jian Sun. "A scheme to ensure data security of cloud storage." In 2013 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI). IEEE, 2013. http://dx.doi.org/10.1109/soli.2013.6611386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kaur, Samjot, and Vikas Wasson. "Enhancement in Homomorphic Encryption Scheme for Cloud Data Security." In 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST). IEEE, 2015. http://dx.doi.org/10.1109/ngmast.2015.38.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cloud Data Security Scheme"

1

Chapman, Sam. PPR2021 - Automated Vehicle Safety Assurance - In-use Safety and Security Monitoring - Task 6: Data Privacy. TRL, 2022. http://dx.doi.org/10.58446/dwll8689.

Full text
Abstract:
This report assesses the data privacy considerations associated with proposals for an in-use safety and security monitoring scheme. This work presents the current legal framework of data privacy in the UK as well as internationally. Based on this the proposals for data capture are assessed against the regulatory requirements to identify any issues. This work finds that the benefits of in-use monitoring to ensuring public safety can justify the capture of data provided that privacy concerns are managed appropriately.
APA, Harvard, Vancouver, ISO, and other styles
2

Perren, Will. PPR2022 - Automated Vehicle Safety Assurance - In-use Safety and Security Monitoring - Task 7: Change Control. TRL, 2022. http://dx.doi.org/10.58446/bpdl3309.

Full text
Abstract:
The proposed in-use safety and security monitoring scheme can serve as an essential feedback mechanism for continual improvement of how the AV safety assurance scheme manages safety. In-use monitoring data can support in identifying changes and assessing their impact. However, making a change without due consideration of the impacts to all stakeholders may lead to increased regulatory inefficiency, undue burden on manufacturers and operators and may ultimately lead to worse safety outcomes. This document outlines a change control process to manage and implement change throughout the entire AV
APA, Harvard, Vancouver, ISO, and other styles
3

Perren, Will, Bryn Balcombe, Ben Simpson, and Kostas Kourantidis. PPR2018 - Automated Vehicle Safety Assurance - In-use Safety and Security Monitoring - Task 3: Safety Monitoring Framework. TRL, 2022. http://dx.doi.org/10.58446/sgxq7004.

Full text
Abstract:
This report examines the feasibility of establishing a regulatory scheme for In-Use Safety and Security monitoring. This report assesses the legal, societal and technological requirements of such a scheme to continually monitor the safety of Automated Vehicles (AVs) using both in-vehicle data streams and operational data. A framework has been proposed which outlines a process of event based data capture, data recall, analysis, investigation, and regulatory intervention to maintain the safety of AVs deployed on roads in Great Britain.
APA, Harvard, Vancouver, ISO, and other styles
4

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Full text
Abstract:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
APA, Harvard, Vancouver, ISO, and other styles
5

Armstrong, Beth, Lucy King, Ayla Ibrahimi, Robin Clifford, Mark Jitlal, and Katie Mears. Food Hygiene Rating Scheme (FHRS) - Food and You 2: Wave 4 Key Findings. Food Standards Agency, 2022. http://dx.doi.org/10.46756/sci.fsa.lyx422.

Full text
Abstract:
Fieldwork for Food and You 2: Wave 4 was conducted between 8th October 2021 and 10th January 2022. A total of 5,796 adults from 4,026 households (an overall response rate of 28.5%) across England, Wales, and Northern Ireland completed the ‘push-to-web’ survey (see Annex A for more information about the methodology). This report presents findings from the F&amp;Y2: Wave 4 ‘Eating out and takeaway’ module relating to the Food Hygiene Rating Scheme (FHRS). A total of 4,755 adults across England, Wales, and Northern Ireland completed the ‘Eating out and takeaway’ module via the online or the ‘Eati
APA, Harvard, Vancouver, ISO, and other styles
6

Malone, Matt. Will Canada’s Bill C-8 Impact the Future of EU-Canada Cross-border Data Flows? Balsillie School of International Affairs, 2025. https://doi.org/10.51644/bap74.

Full text
Abstract:
Canada’s proposed cyber security for critical infrastructure bill, Bill C-8, which reintroduces Bill C-26 from the previous Parliament (with minor tweaks), could lead to a re-evaluation of the European Commission’s adequacy decision concerning Canada’s data protection laws. As such, the bill could push Canada to the brink of a disruption in the framework governing cross-border data flows between the two jurisdictions. Such a scenario would create tremendous uncertainty for actors in the digital economy who routinely process Europeans’ personal data, such as airlines, financial institutions, in
APA, Harvard, Vancouver, ISO, and other styles
7

Semerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], 2019. http://dx.doi.org/10.31812/123456789/3178.

Full text
Abstract:
The authors of the given article continue the series presented by the 2018 paper “Computer Simulation of Neural Networks Using Spreadsheets: The Dawn of the Age of Camelot”. This time, they consider mathematical informatics as the basis of higher engineering education fundamentalization. Mathematical informatics deals with smart simulation, information security, long-term data storage and big data management, artificial intelligence systems, etc. The authors suggest studying basic principles of mathematical informatics by applying cloud-oriented means of various levels including those traditio
APA, Harvard, Vancouver, ISO, and other styles
8

Leathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.

Full text
Abstract:
As smart sensors and the Internet of Things (IoT) exponentially expand, there is an increased need for effective processing solutions for sensor node data located in the operational arena where it can be leveraged for immediate decision support. Current developments reveal that edge computing, where processing and storage are performed close to data generation locations, can meet this need (Ahmed and Ahmed 2016). Edge computing imparts greater flexibility than that experienced in cloud computing architectures (Khan et al. 2019). Despite these benefits, the literature highlights open security i
APA, Harvard, Vancouver, ISO, and other styles
9

The 5th National Global Change Conference; Transformative Futures for Water Security Seminar. Academy of Science of South Africa, 2023. http://dx.doi.org/10.17159/assaf.2023/90.

Full text
Abstract:
The 5th National Global Change Conference organised by the Department of Science and Innovation (DSI) and the National Research Foundation (NRF), in partnership with the University of the Free State (UFS), took place at the Bloemfontein Campus of the UFS, from 30 January to 2 February 2023. The central theme of the 5th National Global Change Conference was: “Research and Innovation Accelerating transformations to global sustainability”. The Academy of Science of South Africa (ASSAf) and the International Water Management Institute (IWMI) jointly hosted a hybrid special session titled, Transfor
APA, Harvard, Vancouver, ISO, and other styles
10

Payment Systems Report - June of 2021. Banco de la República, 2022. http://dx.doi.org/10.32468/rept-sist-pag.eng.2021.

Full text
Abstract:
Banco de la República provides a comprehensive overview of Colombia’s finan¬cial infrastructure in its Payment Systems Report, which is an important product of the work it does to oversee that infrastructure. The figures published in this edition of the report are for the year 2020, a pandemic period in which the con¬tainment measures designed and adopted to alleviate the strain on the health system led to a sharp reduction in economic activity and consumption in Colom¬bia, as was the case in most countries. At the start of the pandemic, the Board of Directors of Banco de la República adopted
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!