Journal articles on the topic 'Cloud Data Security Scheme'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cloud Data Security Scheme.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wu, Tong, Xiaochen Ma, and Hailun Yan. "Enabling Privacy-Preserving Data Sharing with Bilateral Access Control for Cloud." Electronics 12, no. 23 (2023): 4798. http://dx.doi.org/10.3390/electronics12234798.
Full textEl Makkaoui, Khalid, Abderrahim Beni-Hssane, and Abdellah Ezzati. "Cloud-ElGamal and Fast Cloud-RSA Homomorphic Schemes for Protecting Data Confidentiality in Cloud Computing." International Journal of Digital Crime and Forensics 11, no. 3 (2019): 90–102. http://dx.doi.org/10.4018/ijdcf.2019070105.
Full textKumar, Anuj, M. L., and Ritika R. "Cloud Data Security using Auditing Scheme." International Journal of Computer Applications 156, no. 8 (2016): 10–15. http://dx.doi.org/10.5120/ijca2016912483.
Full textYashas, BN, GS Nagaraja, and DV Ashoka. "Data Security Implementation Scheme on Cloud Environment." Journal of Web Development and Web Designing 4, no. 3 (2019): 18–22. https://doi.org/10.5281/zenodo.3558474.
Full textGarima, Anand. "DATA SECURITY TECHNIQUE IN CLOUD COMPUTING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 538–44. https://doi.org/10.5281/zenodo.1402460.
Full textYang, Guangcan, Peixuan Li, Ke Xiao, et al. "An Efficient Attribute-Based Encryption Scheme with Data Security Classification in the Multi-Cloud Environment." Electronics 12, no. 20 (2023): 4237. http://dx.doi.org/10.3390/electronics12204237.
Full textXie, Hui Juan, Wei She, and Chang Hao Han. "Shamir's Threshold Scheme to Ensure Security in Cloud Computing Services." Applied Mechanics and Materials 543-547 (March 2014): 3632–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3632.
Full textDr., S. Rajendirakumar. "Secure and Reliable Data Transfer for Cloud Computing with Quantum Key Distribution." Journal of Scholastic Engineering Science and Management 2, no. 4 (2023): 27–34. https://doi.org/10.5281/zenodo.8195541.
Full textAl Attar, Tara, and Mohammed Anwar MOHAMMED. "Fully Homomorphic Encryption Scheme for Securing Cloud Data." UHD Journal of Science and Technology 7, no. 2 (2023): 40–49. http://dx.doi.org/10.21928/uhdjst.v7n2y2023.pp40-49.
Full textZhu, Binrui, Jiameng Sun, Jing Qin, and Jixin Ma. "A Secure Data Sharing Scheme with Designated Server." Security and Communication Networks 2019 (June 27, 2019): 1–16. http://dx.doi.org/10.1155/2019/4268731.
Full textSmitha, K*1 &. Mrs. Amaya Anna Joy2. "A SURVEY ON ATTRIBUTE-BASED ACCESS CONTROL MECHANISMS IN CLOUD ENVIRONMENT." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Metanoia 19 (April 5, 2019): 76–80. https://doi.org/10.5281/zenodo.2630856.
Full textXu, Kun, Weiwei Chen, and Yanan Zhang. "Blockchain-based Integrity Verification of Data Migration in Multi-cloud Storage." Journal of Physics: Conference Series 2132, no. 1 (2021): 012031. http://dx.doi.org/10.1088/1742-6596/2132/1/012031.
Full textZheng, Kaifa, Caiyang Ding, and Jinchen Wang. "A Secure Data-Sharing Scheme for Privacy-Preserving Supporting Node–Edge–Cloud Collaborative Computation." Electronics 12, no. 12 (2023): 2737. http://dx.doi.org/10.3390/electronics12122737.
Full textWhaiduzzaman, Md, Nishat Farjana, Alistair Barros, et al. "HIBAF: A data security scheme for fog computing." Journal of High Speed Networks 27, no. 4 (2021): 381–402. http://dx.doi.org/10.3233/jhs-210673.
Full textPark, Kisung, and Youngho Park. "iAKA-CIoT: An Improved Authentication and Key Agreement Scheme for Cloud Enabled Internet of Things Using Physical Unclonable Function." Sensors 22, no. 16 (2022): 6264. http://dx.doi.org/10.3390/s22166264.
Full textMeng, Wenjuan, Jianhua Ge, and Tao Jiang. "Secure Data Deduplication with Reliable Data Deletion in Cloud." International Journal of Foundations of Computer Science 30, no. 04 (2019): 551–70. http://dx.doi.org/10.1142/s0129054119400124.
Full textKumar, P. Syam, Marie Stanislas Ashok, and R. Subramanian. "A Publicly Verifiable Dynamic Secret Sharing Protocol for Secure and Dependable Data Storage in Cloud Computing." International Journal of Cloud Applications and Computing 2, no. 3 (2012): 1–25. http://dx.doi.org/10.4018/ijcac.2012070101.
Full textBilal, Hussain Ch, and Subayyal. "Securing Cloud Data with the Application of Image Processing." International Journal of Trend in Scientific Research and Development 2, no. 6 (2018): 297–301. https://doi.org/10.31142/ijtsrd18454.
Full textPing, Yuan, Yu Zhan, Ke Lu, and Baocang Wang. "Public Data Integrity Verification Scheme for Secure Cloud Storage." Information 11, no. 9 (2020): 409. http://dx.doi.org/10.3390/info11090409.
Full textFatima, Shahin, and Shish Ahmad. "Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing." International Journal of e-Collaboration 16, no. 1 (2020): 1–15. http://dx.doi.org/10.4018/ijec.2020010101.
Full textBhushan, B. Shaharkar, and P. Pandit Darshan. "ML Based Authentication Scheme for Data Storage in Cloud Based IoT." International Journal of Engineering and Advanced Technology (IJEAT) 11, no. 6 (2022): 123–27. https://doi.org/10.35940/ijeat.F3767.0811622.
Full textPassricha, Vishal, Ashish Chopra, and Shubhanshi Singhal. "Secure Deduplication Scheme for Cloud Encrypted Data." International Journal of Advanced Pervasive and Ubiquitous Computing 11, no. 2 (2019): 27–40. http://dx.doi.org/10.4018/ijapuc.2019040103.
Full textSwapnil, D. Raut* Prof. Nitin R. Chopde. "KEY-AGGREGATE SEARCHABLE ENCRYPTION FOR GROUP DATA SHARING IN CLOUD STORAGE." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 6 (2018): 264–74. https://doi.org/10.5281/zenodo.1284200.
Full textHuang, Qinlong, Yue He, Wei Yue, and Yixian Yang. "Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption." Security and Communication Networks 2018 (October 1, 2018): 1–12. http://dx.doi.org/10.1155/2018/8932325.
Full textMs.Fathima, Zimarin1, Mohamed Faliyil V.F2 Mr., Najtha A.S3 Ms., Thasneem P.A4 Ms., and Shemitha P.A5 Ms. "EXPRESSIVE,EFFICIENT,AND REVOCABLE DATA ACCESS CONTROL FOR MULTI-AUTHORITY CLOUD STORAGE." International Journal of Advances in Engineering & Scientific Research 3, no. 6 (2016): 01–10. https://doi.org/10.5281/zenodo.10774421.
Full textZhu, Binrui, Willy Susilo, Jing Qin, Fuchun Guo, Zhen Zhao, and Jixin Ma. "A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks." Sensors 19, no. 11 (2019): 2583. http://dx.doi.org/10.3390/s19112583.
Full textAbdel-Kader, Rabab F., Samar H. El-sherif, and Rawya Y. Rizk. "Efficient two-stage cryptography scheme for secure distributed data storage in cloud computing." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 3295. http://dx.doi.org/10.11591/ijece.v10i3.pp3295-3306.
Full textRabab, F. Abdel-Kader, H. El-Sherif Samar, and University Port-Said. "Efficient two-stage cryptography scheme for secure distributed data storage in cloud computing." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 3295–306. https://doi.org/10.11591/ijece.v10i3.pp3295-3306.
Full textYang, Xiaodong, Aijia Chen, Zhisong Wang, and Shudong Li. "Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute-Based Encryption." Security and Communication Networks 2022 (May 11, 2022): 1–12. http://dx.doi.org/10.1155/2022/2204832.
Full textSwapnil, D. Raut*, Avinash P. Wadhe Prof., and Jayant P. Mehare Prof. "A SURVEY ON KEY-AGGREGATE SEARCHABLE ENCRYPTION FOR GROUP DATA SHARING IN CLOUD STORAGE." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 3 (2016): 714–20. https://doi.org/10.5281/zenodo.48345.
Full textPeng, Tianqi, Bei Gong, Shanshan Tu, et al. "Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT." Sensors 24, no. 23 (2024): 7597. http://dx.doi.org/10.3390/s24237597.
Full textChen, Jiahao, Jingwei Wang, Xinchun Yin, and Jianting Ning. "A Fine-Grained Medical Data Sharing Scheme with Ciphertext Reencryption." Wireless Communications and Mobile Computing 2022 (March 27, 2022): 1–16. http://dx.doi.org/10.1155/2022/3923597.
Full textLi, Haifeng, Caihui Lan, Xingbing Fu, Caifen Wang, Fagen Li, and He Guo. "A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing." Sensors 20, no. 17 (2020): 4720. http://dx.doi.org/10.3390/s20174720.
Full textJayalakshmi, Karemallaiah, and Revaiah Prabha. "Verifiable data distribution technique for multiple applicants in a cloud computing ecosystem." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 2 (2024): 1241–49. https://doi.org/10.11591/ijai.v13.i2.pp1241-1249.
Full textShaharkar, Bhushan B., and Darshan P. Pandit. "ML Based Authentication Scheme for Data Storage in Cloud Based IoT." International Journal of Engineering and Advanced Technology 11, no. 6 (2022): 123–27. http://dx.doi.org/10.35940/ijeat.f3767.0811622.
Full textYan, Lu, Haozhe Qin, Kexin Yang, Heye Xie, Xu An Wang, and Shuanggen Liu. "Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing." Electronics 13, no. 3 (2024): 534. http://dx.doi.org/10.3390/electronics13030534.
Full textKumar, V. Satish, and V.Trilik Kumar. "SECURING DATA USING FULLY HOMOMORPHIC ENCRYPTION SCHEMES OVER CLOUD COMPUTING." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 10 (2014): 1157–60. https://doi.org/10.5281/zenodo.14759355.
Full textArnold, Mashud Abukari, Kwedzo Bankas Edem, and Iddrisu Muniru Mohammed. "AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA." International Journal on Cryptography and Information Security (IJCIS) 10, no. 1 (2020): 1–9. https://doi.org/10.5281/zenodo.3743084.
Full textRodriguez, Stephen, and Paolina Centonze. "Multi-Layered Dynamic Encryption Security Scheme for Cloud Data Storage." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 16, no. 3 (2017): 6233–39. http://dx.doi.org/10.24297/ijct.v16i3.6150.
Full textB., Rakesh, Lalitha K., Sushama C., Parveen Sultana H., and Rajitha O. "Distributed scheme to authenticate data storage security in cloud computing." Bulletin of Electrical Engineering and Informatics 8, no. 2 (2019): 683–89. https://doi.org/10.11591/eei.v8i2.1475.
Full textLi, Xiuguang, Zhengge Yi, Ruifeng Li, Xu-An Wang, Hui Li, and Xiaoyuan Yang. "SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios." Sensors 23, no. 9 (2023): 4307. http://dx.doi.org/10.3390/s23094307.
Full textWang, Hong Hua. "Study of Data Security Based on Cloud Computing." Advanced Materials Research 756-759 (September 2013): 1097–100. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1097.
Full textJarwal, Abhimanyu, Kamlesh Kumar, and Ajay Kumar. "Secure Data Encryption Scheme for Cloud Computing." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 897–902. http://dx.doi.org/10.22214/ijraset.2023.51058.
Full textHao Yan, Hao Yan, Yanan Liu Hao Yan, Dandan Huang Yanan Liu, Shuo Qiu Dandan Huang, and Zheng Zhang Shuo Qiu. "Public Integrity Verification for Cloud Storage with Efficient Key-update." 網際網路技術學刊 24, no. 6 (2023): 1263–71. http://dx.doi.org/10.53106/160792642023112406009.
Full textSermakani, A. M., and D. Paulraj. "Effective Data Storage and Dynamic Data Auditing Scheme for Providing Distributed Services in Federated Cloud." Journal of Circuits, Systems and Computers 29, no. 16 (2020): 2050259. http://dx.doi.org/10.1142/s021812662050259x.
Full textD P, Sneha. "A Survey on Approach for Efficient and Secure Data Encryption Scheme for Spatial Data." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 4918–23. http://dx.doi.org/10.22214/ijraset.2022.46011.
Full textLiu, Ping, Syed Hamad Shirazi, Wei Liu, and Yong Xie. "pKAS: A Secure Password-Based Key Agreement Scheme for the Edge Cloud." Security and Communication Networks 2021 (October 18, 2021): 1–10. http://dx.doi.org/10.1155/2021/6571700.
Full textYadav, Meenu. "A Dual Encryption Scheme for Network Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29746.
Full textTian, Qiuting, Dezhi Han, and Yanmei Jiang. "Hierarchical authority based weighted attribute encryption scheme." Computer Science and Information Systems 16, no. 3 (2019): 797–813. http://dx.doi.org/10.2298/csis180912027t.
Full textSheng, Luo. "User Privacy Protection Scheme Based on Verifiable Outsourcing Attribute-Based Encryption." Security and Communication Networks 2021 (August 16, 2021): 1–11. http://dx.doi.org/10.1155/2021/6617669.
Full text