To see the other types of publications on this topic, follow the link: Cloud Data Security Scheme.

Journal articles on the topic 'Cloud Data Security Scheme'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cloud Data Security Scheme.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wu, Tong, Xiaochen Ma, and Hailun Yan. "Enabling Privacy-Preserving Data Sharing with Bilateral Access Control for Cloud." Electronics 12, no. 23 (2023): 4798. http://dx.doi.org/10.3390/electronics12234798.

Full text
Abstract:
Cloud computing plays an essential role in various fields. However, the existing cloud services face a severe challenge, which is how to share the data among a large scale of devices securely. In this paper, we introduce a cloud-based privacy-preserving data sharing scheme, derived from identity-based matchmaking encryption. In our scheme, the access policies are designed by both the sender and receiver simultaneously, to support bilateral access control. To improve efficiency, we delegate the match algorithm to the cloud server, reducing the computation cost and communication overhead on end
APA, Harvard, Vancouver, ISO, and other styles
2

El Makkaoui, Khalid, Abderrahim Beni-Hssane, and Abdellah Ezzati. "Cloud-ElGamal and Fast Cloud-RSA Homomorphic Schemes for Protecting Data Confidentiality in Cloud Computing." International Journal of Digital Crime and Forensics 11, no. 3 (2019): 90–102. http://dx.doi.org/10.4018/ijdcf.2019070105.

Full text
Abstract:
Homomorphic encryption (HE) is an encryption form that offers a third-party with the ability to carry out computations on encrypted data. This property can be considered as a great solution to get over some obstacles limiting the wide-spread adoption of cloud computing (CC) services. Since CC environments are threatened by insider/outsider security attacks and since CC consumers often access to CC services using resource-limited devices, the HE schemes need to be promoted at security level and at running time to work effectively. For this reason, at EMENA-TSSL'16 and at WINCOM'16, the authors
APA, Harvard, Vancouver, ISO, and other styles
3

Kumar, Anuj, M. L., and Ritika R. "Cloud Data Security using Auditing Scheme." International Journal of Computer Applications 156, no. 8 (2016): 10–15. http://dx.doi.org/10.5120/ijca2016912483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yashas, BN, GS Nagaraja, and DV Ashoka. "Data Security Implementation Scheme on Cloud Environment." Journal of Web Development and Web Designing 4, no. 3 (2019): 18–22. https://doi.org/10.5281/zenodo.3558474.

Full text
Abstract:
<em>Cloud computing usage and its environment is increasing rapidly due to the extensive availability of resources for all end users and professionals to retrieve the data all the time everywhere. However, privacy, the prime concern to do secure searches over the encrypted cloud data is the key factor. This motivated all stakeholders to work on different research domains and its variants under a single owner environment. All cloud servers in a distributed environment support multiple owners to share the benefits brought by cloud computing instead of single ownership. The proposed work manages
APA, Harvard, Vancouver, ISO, and other styles
5

Garima, Anand. "DATA SECURITY TECHNIQUE IN CLOUD COMPUTING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 538–44. https://doi.org/10.5281/zenodo.1402460.

Full text
Abstract:
Cloud computing is the delivery of computing services over the Internet. The platform of cloud computing gives peoples the opportunity of sharing and storing resources and information among the people across the globe. Most of organizations, individual and end users are making use of such online storage services to store their important information for the backup purpose. This new paradigm brings about many new security challenges. At present ensuring security in cloud computing platform has become one of the most significant concerns for the researchers. Many any new frameworks and technologi
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Guangcan, Peixuan Li, Ke Xiao, et al. "An Efficient Attribute-Based Encryption Scheme with Data Security Classification in the Multi-Cloud Environment." Electronics 12, no. 20 (2023): 4237. http://dx.doi.org/10.3390/electronics12204237.

Full text
Abstract:
As an increasing number of people and corporations move their data to the cloud side, how to ensure efficient and secure access to data stored on the cloud side has become a key focus of current research. Attribute-Based Encryption (ABE) is largely recognized as the best access control method for safeguarding the cloud storage environment, and numerous solutions based on ABE have been developed successively. However, the majority of current research is conducted within a single cloud provider, and only the limited number of schemes for the multi-cloud environment also fail to support the data
APA, Harvard, Vancouver, ISO, and other styles
7

Xie, Hui Juan, Wei She, and Chang Hao Han. "Shamir's Threshold Scheme to Ensure Security in Cloud Computing Services." Applied Mechanics and Materials 543-547 (March 2014): 3632–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3632.

Full text
Abstract:
Cloud computing system preserves the security and privacy of a user's data by replicating data among several clouds and by using the secret sharing approach. It uses the database management system DBMS (data source) to manage and control the operations between the clients and them ulti-clouds inside a cloud service provider [1]. Generally speaking, The Shamir's threshold scheme is suitable for the shares in the cloud computing. The Shamir's threshold scheme as a secret sharing scheme will attract more attention in the cloud computing in future.
APA, Harvard, Vancouver, ISO, and other styles
8

Dr., S. Rajendirakumar. "Secure and Reliable Data Transfer for Cloud Computing with Quantum Key Distribution." Journal of Scholastic Engineering Science and Management 2, no. 4 (2023): 27–34. https://doi.org/10.5281/zenodo.8195541.

Full text
Abstract:
<strong>The increasing use of cloud computing has raised concerns about the security of sensitive data. Quantum computers pose a serious threat to the security of traditional encryption schemes, as they could be used to break these schemes in a relatively short amount of time. Quantum cryptography offers a promising solution to this problem, as it provides a secure way to exchange keys that cannot be broken by quantum computers. In this paper, we propose a novel data security scheme for cloud computing that uses quantum key distribution (QKD). The scheme uses a QKD protocol to establish a shar
APA, Harvard, Vancouver, ISO, and other styles
9

Al Attar, Tara, and Mohammed Anwar MOHAMMED. "Fully Homomorphic Encryption Scheme for Securing Cloud Data." UHD Journal of Science and Technology 7, no. 2 (2023): 40–49. http://dx.doi.org/10.21928/uhdjst.v7n2y2023.pp40-49.

Full text
Abstract:
One of the pioneer and important fields in the computer science area is cloud computing. The data within cloud computing are usually transformed to it from local storage; therefore, the security of this data is an important issue. To solve this data security issue, it is important that cloud service providers (CSPs) store encrypted versions of user data. Before transmitting data to the cloud provider, it was encrypted using traditional encryption schemes. Nevertheless, for these schemes, the private key must be provided to the server to be used for the decryption on the other side before any c
APA, Harvard, Vancouver, ISO, and other styles
10

Zhu, Binrui, Jiameng Sun, Jing Qin, and Jixin Ma. "A Secure Data Sharing Scheme with Designated Server." Security and Communication Networks 2019 (June 27, 2019): 1–16. http://dx.doi.org/10.1155/2019/4268731.

Full text
Abstract:
The cloud-assisted Internet of Things (CIoT) is booming, which utilizes powerful data processing capabilities of the cloud platform to solve massive Internet of Things (IoT) data. However, the CIoT faces new security challenges, such as the confidentiality of the outsourced data. Data encryption is a fundamental technique that can guarantee the confidentiality of outsourced data, but it limits target encrypted data retrieval from cloud platform. Public key encryption with keyword search (PEKS) provides a promising solution to address this problem. In PEKS, a cloud server can be authorized to s
APA, Harvard, Vancouver, ISO, and other styles
11

Smitha, K*1 &. Mrs. Amaya Anna Joy2. "A SURVEY ON ATTRIBUTE-BASED ACCESS CONTROL MECHANISMS IN CLOUD ENVIRONMENT." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Metanoia 19 (April 5, 2019): 76–80. https://doi.org/10.5281/zenodo.2630856.

Full text
Abstract:
Cloud computing is a top emerging technology in the IT industry. It is a computing mode, which provides users with services, applications, storage and so on. Due to the internet based storage of cloud computing there exist a lot of security risks for the outsourced data. Several techniques including attribute based encryption (ABE) is introduced to provide security to the outsourced data. Most of the outsourced data in cloud suffer from large complexity in implementing access policies. In Attribute-based Encryption (ABE)[4] scheme, attributes has a very important role where a set of values are
APA, Harvard, Vancouver, ISO, and other styles
12

Xu, Kun, Weiwei Chen, and Yanan Zhang. "Blockchain-based Integrity Verification of Data Migration in Multi-cloud Storage." Journal of Physics: Conference Series 2132, no. 1 (2021): 012031. http://dx.doi.org/10.1088/1742-6596/2132/1/012031.

Full text
Abstract:
Abstract In the process of multi-cloud storage data migration, data integrity is vulnerable to corruption, but the existing data integrity verification schemes for data migration across clouds are not highly reliable. To address this problem, a blockchain-based data integrity verification scheme for migration across clouds is proposed in this paper. In this scheme, a blockchain network is used instead of a third-party auditor. For each migration, a multi-cloud broker will send an integrity verification request to blockchain at three different times, and a smart contract will verify the data in
APA, Harvard, Vancouver, ISO, and other styles
13

Zheng, Kaifa, Caiyang Ding, and Jinchen Wang. "A Secure Data-Sharing Scheme for Privacy-Preserving Supporting Node–Edge–Cloud Collaborative Computation." Electronics 12, no. 12 (2023): 2737. http://dx.doi.org/10.3390/electronics12122737.

Full text
Abstract:
The node–edge–cloud collaborative computation paradigm has introduced new security challenges to data sharing. Existing data-sharing schemes suffer from limitations such as low efficiency and inflexibility and are not easily integrated with the node–edge–cloud environment. Additionally, they do not provide hierarchical access control or dynamic changes to access policies for data privacy preservation, leading to a poor user experience and lower security. To address these issues, we propose a data-sharing scheme using attribute-based encryption (ABE) that supports node–edge–cloud collaborative
APA, Harvard, Vancouver, ISO, and other styles
14

Whaiduzzaman, Md, Nishat Farjana, Alistair Barros, et al. "HIBAF: A data security scheme for fog computing." Journal of High Speed Networks 27, no. 4 (2021): 381–402. http://dx.doi.org/10.3233/jhs-210673.

Full text
Abstract:
Fog computing complemented cloud computing integration services in the Internet of Things (IoT) and the web of real-time interactivity. Fog offers faster computing and other services facilities sitting close to user applications. However, secure data transfer in the fog is still a challenging issue requiring attention and efficient deployment of a secure data security scheme. We present an Identity Based Encryption (IBE) scheme to secure data security and transmission in fog clouds and IoT ecosystems. We devise and develop a four-level Hierarchical Identity Based Architecture for Fog Computing
APA, Harvard, Vancouver, ISO, and other styles
15

Park, Kisung, and Youngho Park. "iAKA-CIoT: An Improved Authentication and Key Agreement Scheme for Cloud Enabled Internet of Things Using Physical Unclonable Function." Sensors 22, no. 16 (2022): 6264. http://dx.doi.org/10.3390/s22166264.

Full text
Abstract:
The Internet of Things (IoT) with cloud services are important functionalities in the latest IoT systems for providing various convenient services. These cloud-enabled IoT environments collect, analyze, and monitor surrounding data, resulting in the most effective handling of large amounts of heterogeneous data. In these environments, secure authentication with a key agreement mechanism is essential to ensure user and data privacy when transmitting data between the cloud server and IoT nodes. In this study, we prove that the previous scheme contains various security threats, and hence cannot g
APA, Harvard, Vancouver, ISO, and other styles
16

Meng, Wenjuan, Jianhua Ge, and Tao Jiang. "Secure Data Deduplication with Reliable Data Deletion in Cloud." International Journal of Foundations of Computer Science 30, no. 04 (2019): 551–70. http://dx.doi.org/10.1142/s0129054119400124.

Full text
Abstract:
A cloud storage system which incorporates the deletion and deduplication functionalities will have both security and efficiency advantages over exiting solutions which provide only one of them. However, the security models of secure data deletion and data deduplication functionalities are not compatible with each other, which will cause security and efficiency vulnerability under coercive adversaries. To solve these security and efficiency challenges, we define and construct a scheme, whose security relies on the proper erasure of keys in the wrapped key tree and periodical update of the dedup
APA, Harvard, Vancouver, ISO, and other styles
17

Kumar, P. Syam, Marie Stanislas Ashok, and R. Subramanian. "A Publicly Verifiable Dynamic Secret Sharing Protocol for Secure and Dependable Data Storage in Cloud Computing." International Journal of Cloud Applications and Computing 2, no. 3 (2012): 1–25. http://dx.doi.org/10.4018/ijcac.2012070101.

Full text
Abstract:
Data storage is an important application of cloud computing, where the users can remotely store their data into the cloud. This new paradigm of data storage service also introduces security challenges, such as Confidentiality, Integrity and Availability of data. The protection of these issues in cloud is a very challenging and potentially formidable task, especially for the users with constrained resources. Therefore, an independent auditing service is required to address these issues of data stored in the cloud. The existing schemes may not scale well for this purpose. This paper proposes a p
APA, Harvard, Vancouver, ISO, and other styles
18

Bilal, Hussain Ch, and Subayyal. "Securing Cloud Data with the Application of Image Processing." International Journal of Trend in Scientific Research and Development 2, no. 6 (2018): 297–301. https://doi.org/10.31142/ijtsrd18454.

Full text
Abstract:
Cloud computing is a new paradigm of shifting resources over the network so that the user can access the resources over the network. The resource mainly consists of Platform as a service, Software as service, and infrastructure as a service. Cloud computing is a basically internet based computing where the services are provided on pay as you go model. The consumers pay for the services they want and services are provided to them on cloud. Since cloud uses distributed resourcing scheme it is important to provide security in the cloud. And we also know that security is the main problem in cloud.
APA, Harvard, Vancouver, ISO, and other styles
19

Ping, Yuan, Yu Zhan, Ke Lu, and Baocang Wang. "Public Data Integrity Verification Scheme for Secure Cloud Storage." Information 11, no. 9 (2020): 409. http://dx.doi.org/10.3390/info11090409.

Full text
Abstract:
Although cloud storage provides convenient data outsourcing services, an untrusted cloud server frequently threatens the integrity and security of the outsourced data. Therefore, it is extremely urgent to design security schemes allowing the users to check the integrity of data with acceptable computational and communication overheads. In this paper, we first propose a public data integrity verification scheme based on the algebraic signature and elliptic curve cryptography. This scheme not only allows the third party authority deputize for users to verify the outsourced data integrity, but al
APA, Harvard, Vancouver, ISO, and other styles
20

Fatima, Shahin, and Shish Ahmad. "Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing." International Journal of e-Collaboration 16, no. 1 (2020): 1–15. http://dx.doi.org/10.4018/ijec.2020010101.

Full text
Abstract:
Security is a crucial problem in Cloud computing. Storing and accessing the data in the Cloud is very popular nowadays but the security of data is still lagging behind. Secret sharing schemes are widely used to improve the security of data. In this article, a threshold secret sharing scheme using Newton divided difference interpolating polynomial (TSSNIP) is proposed in a distributed Cloud environment to enhance security of keys used for encryption. The proposed method uses a Newton divided difference interpolating polynomial for key splitting and key reconstruction. A threshold value is used
APA, Harvard, Vancouver, ISO, and other styles
21

Bhushan, B. Shaharkar, and P. Pandit Darshan. "ML Based Authentication Scheme for Data Storage in Cloud Based IoT." International Journal of Engineering and Advanced Technology (IJEAT) 11, no. 6 (2022): 123–27. https://doi.org/10.35940/ijeat.F3767.0811622.

Full text
Abstract:
<strong>Abstract: </strong>Today, organizations are using IoT devices to accurately collect real data and make better business decisions to increase customer satisfaction. The data collected should be stored and stored in a well-designed storage system, which encourages companies to review their data storage infrastructure. The company needs to store data created by the Internet of Things, and that data grows exponentially, forcing IoT to think about cloud storage for data storage. Security issues are a major concern when handling and processing data in DI and cloud environments. Secure integr
APA, Harvard, Vancouver, ISO, and other styles
22

Passricha, Vishal, Ashish Chopra, and Shubhanshi Singhal. "Secure Deduplication Scheme for Cloud Encrypted Data." International Journal of Advanced Pervasive and Ubiquitous Computing 11, no. 2 (2019): 27–40. http://dx.doi.org/10.4018/ijapuc.2019040103.

Full text
Abstract:
Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users towards CS but this causes a lot of storage pressure on CS systems because a large volume of this data is redundant. Data deduplication is an effective data reduction technique. The dynamic nature of data makes security and ownership of data as a very important issue. Proof-of-ownership schemes are a robust way to check the ownership claimed by any owner. However, this method affects the deduplicati
APA, Harvard, Vancouver, ISO, and other styles
23

Swapnil, D. Raut* Prof. Nitin R. Chopde. "KEY-AGGREGATE SEARCHABLE ENCRYPTION FOR GROUP DATA SHARING IN CLOUD STORAGE." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 6 (2018): 264–74. https://doi.org/10.5281/zenodo.1284200.

Full text
Abstract:
Security concerns over inadvertent data leaks in the cloud may greatly ease the capability of selectively sharing encrypted data with different users via public cloud storage. So designing such an encryption schemes is a key challenge which lies in the efficient management of encryption keys. When any group of selected documents need to share with any group of users a desired flexibility is required with demands different encryption keys, which are used for different documents. However this also indicates the need of securely sharing to users a large number of keys for encryption and search, a
APA, Harvard, Vancouver, ISO, and other styles
24

Huang, Qinlong, Yue He, Wei Yue, and Yixian Yang. "Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption." Security and Communication Networks 2018 (October 1, 2018): 1–12. http://dx.doi.org/10.1155/2018/8932325.

Full text
Abstract:
Data collaboration in cloud computing is more and more popular nowadays, and proxy deployment schemes are employed to realize cross-cloud data collaboration. However, data security and privacy are the most serious issues that would raise great concerns from users when they adopt cloud systems to handle data collaboration. Different cryptographic techniques are deployed in different cloud service providers, which makes cross-cloud data collaboration to be a deeper challenge. In this paper, we propose an adaptive secure cross-cloud data collaboration scheme with identity-based cryptography (IBC)
APA, Harvard, Vancouver, ISO, and other styles
25

Ms.Fathima, Zimarin1, Mohamed Faliyil V.F2 Mr., Najtha A.S3 Ms., Thasneem P.A4 Ms., and Shemitha P.A5 Ms. "EXPRESSIVE,EFFICIENT,AND REVOCABLE DATA ACCESS CONTROL FOR MULTI-AUTHORITY CLOUD STORAGE." International Journal of Advances in Engineering & Scientific Research 3, no. 6 (2016): 01–10. https://doi.org/10.5281/zenodo.10774421.

Full text
Abstract:
&nbsp; <strong>Abstract: </strong> &nbsp; Data access control is an effective way to ensure the data security in the cloud. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Cipher text-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage, because it gives data owners more direct control on access policies. However, it is difficult to directly apply existing CP-ABE schemes to data access control for cloud storage systems because of
APA, Harvard, Vancouver, ISO, and other styles
26

Zhu, Binrui, Willy Susilo, Jing Qin, Fuchun Guo, Zhen Zhao, and Jixin Ma. "A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks." Sensors 19, no. 11 (2019): 2583. http://dx.doi.org/10.3390/s19112583.

Full text
Abstract:
Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the cloud-assisted WSN faces new security challenges, particularly outsourced data confidentiality. Data Encryption is a fundamental approach but it limits target data retrieval in massive encrypted data. Public key encryption with keyword search (PEKS) enables a data receiver to retrieve encrypted data containing some specific keyword in cloud-assisted WSN. However, the traditional PEKS schemes suffer from an inherent problem, namely, the keywor
APA, Harvard, Vancouver, ISO, and other styles
27

Abdel-Kader, Rabab F., Samar H. El-sherif, and Rawya Y. Rizk. "Efficient two-stage cryptography scheme for secure distributed data storage in cloud computing." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 3295. http://dx.doi.org/10.11591/ijece.v10i3.pp3295-3306.

Full text
Abstract:
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra har
APA, Harvard, Vancouver, ISO, and other styles
28

Rabab, F. Abdel-Kader, H. El-Sherif Samar, and University Port-Said. "Efficient two-stage cryptography scheme for secure distributed data storage in cloud computing." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 3295–306. https://doi.org/10.11591/ijece.v10i3.pp3295-3306.

Full text
Abstract:
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra har
APA, Harvard, Vancouver, ISO, and other styles
29

Yang, Xiaodong, Aijia Chen, Zhisong Wang, and Shudong Li. "Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute-Based Encryption." Security and Communication Networks 2022 (May 11, 2022): 1–12. http://dx.doi.org/10.1155/2022/2204832.

Full text
Abstract:
Cloud storage is a popular model of the application in various fields, and the security of storage data and access permission have been widely considered. Attribute-based encryption (ABE) provides fine-grained user access control and ensures data confidentiality. However, current ABE access control schemes rely on trusted cloud servers and provide a low level of security. To solve these problems of traditional encryption schemes, we propose a blockchain-based and ABE cloud storage data access control scheme. In this article, blockchain and smart contract technology are the core elements to ens
APA, Harvard, Vancouver, ISO, and other styles
30

Swapnil, D. Raut*, Avinash P. Wadhe Prof., and Jayant P. Mehare Prof. "A SURVEY ON KEY-AGGREGATE SEARCHABLE ENCRYPTION FOR GROUP DATA SHARING IN CLOUD STORAGE." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 3 (2016): 714–20. https://doi.org/10.5281/zenodo.48345.

Full text
Abstract:
Security concerns over inadvertent data leaks in the cloud may greatly ease the capability of selectively sharing encrypted data with different users via public cloud storage. So designing such an encryption schemes is a key challenge which lies in the efficient management of encryption keys. When any group of selected documents need to share with any group of users a desired flexibility is required with demands different encryption keys, which are used for different documents. However this also indicates the need of securely sharing to users a large number of keys for encryption and search, a
APA, Harvard, Vancouver, ISO, and other styles
31

Peng, Tianqi, Bei Gong, Shanshan Tu, et al. "Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT." Sensors 24, no. 23 (2024): 7597. http://dx.doi.org/10.3390/s24237597.

Full text
Abstract:
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced data stored on cloud servers while ensuring data privacy. Forward privacy and backward privacy are necessary security requirements for DSSE. However, most existing schemes either trade the server’s large storage overhead for forward privacy or trade efficiency/overhead for weak backward privacy. These schemes cannot fully meet the security req
APA, Harvard, Vancouver, ISO, and other styles
32

Chen, Jiahao, Jingwei Wang, Xinchun Yin, and Jianting Ning. "A Fine-Grained Medical Data Sharing Scheme with Ciphertext Reencryption." Wireless Communications and Mobile Computing 2022 (March 27, 2022): 1–16. http://dx.doi.org/10.1155/2022/3923597.

Full text
Abstract:
With the fantastic development of cloud computing technology, cloud storage has been widely applied in the field of medical data sharing due to its efficiency and flexibility. Attribute-based encryption (ABE), as a promising technology, plays an important role in the fine-grained sharing of medical data. However, there are two issues: (1) an access policy specified in the encryption phase may need to be updated after a period of time, and (2) the considerable decryption overhead in ABE is too heavy for resource-limited devices. To address these issues, a fine-grained medical data sharing schem
APA, Harvard, Vancouver, ISO, and other styles
33

Li, Haifeng, Caihui Lan, Xingbing Fu, Caifen Wang, Fagen Li, and He Guo. "A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing." Sensors 20, no. 17 (2020): 4720. http://dx.doi.org/10.3390/s20174720.

Full text
Abstract:
With the explosion of various mobile devices and the tremendous advancement in cloud computing technology, mobile devices have been seamlessly integrated with the premium powerful cloud computing known as an innovation paradigm named Mobile Cloud Computing (MCC) to facilitate the mobile users in storing, computing and sharing their data with others. Meanwhile, Attribute Based Encryption (ABE) has been envisioned as one of the most promising cryptographic primitives for providing secure and flexible fine-grained “one to many” access control, particularly in large scale distributed system with u
APA, Harvard, Vancouver, ISO, and other styles
34

Jayalakshmi, Karemallaiah, and Revaiah Prabha. "Verifiable data distribution technique for multiple applicants in a cloud computing ecosystem." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 2 (2024): 1241–49. https://doi.org/10.11591/ijai.v13.i2.pp1241-1249.

Full text
Abstract:
Cloud computing is the most exploited research technology in both industry and academia due to wide application and increases in adoption from global organizations. In cloud, computing data storage is one of the primary resources offered through cloud computing, however, an increase in participants raises major security concerns, as the user has no hold over the data. Furthermore, recent research has shown great potential for efficient data sharing with multiple participants. Existing researches suggest complicated and inefficient cloud security architecture. Hence, this research work proposes
APA, Harvard, Vancouver, ISO, and other styles
35

Shaharkar, Bhushan B., and Darshan P. Pandit. "ML Based Authentication Scheme for Data Storage in Cloud Based IoT." International Journal of Engineering and Advanced Technology 11, no. 6 (2022): 123–27. http://dx.doi.org/10.35940/ijeat.f3767.0811622.

Full text
Abstract:
Today, organizations are using IoT devices to accurately collect real data and make better business decisions to increase customer satisfaction. The data collected should be stored and stored in a well-designed storage system, which encourages companies to review their data storage infrastructure. The company needs to store data created by the Internet of Things, and that data grows exponentially, forcing IoT to think about cloud storage for data storage. Security issues are a major concern when handling and processing data in DI and cloud environments. Secure integration of IoT and cloud comp
APA, Harvard, Vancouver, ISO, and other styles
36

Yan, Lu, Haozhe Qin, Kexin Yang, Heye Xie, Xu An Wang, and Shuanggen Liu. "Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing." Electronics 13, no. 3 (2024): 534. http://dx.doi.org/10.3390/electronics13030534.

Full text
Abstract:
The popularity of secure cloud data sharing is on the rise, but it also comes with significant concerns about privacy violations and data tampering. While existing Proxy Re-Encryption (PRE) schemes effectively protect data in the cloud, challenges persist with certificate administration and key escrow. Moreover, the increasing number of users and prevalence of lightweight devices demand functional and cost-effective solutions. To address these issues, this paper presents a novel Pairing-free Certificate-Based Proxy Re-Encryption Plus scheme that leverages elliptic curve groups for improved eff
APA, Harvard, Vancouver, ISO, and other styles
37

Kumar, V. Satish, and V.Trilik Kumar. "SECURING DATA USING FULLY HOMOMORPHIC ENCRYPTION SCHEMES OVER CLOUD COMPUTING." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 10 (2014): 1157–60. https://doi.org/10.5281/zenodo.14759355.

Full text
Abstract:
There is a problem for business organizations to move towards cloud computing regarding the safety and security issues associated with cloud computing. Different technologies have been used to relate these types of issues including various control methods and cryptographic techniques. When the data transmitted to the Cloud we use standard encryption methods to secure the operations and the storage of the data. Fully homomorphic encryption has cloud computing is to perform computations on encrypted data without previous decryption. The first fully homomorphic schemes have been proposed and deve
APA, Harvard, Vancouver, ISO, and other styles
38

Arnold, Mashud Abukari, Kwedzo Bankas Edem, and Iddrisu Muniru Mohammed. "AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA." International Journal on Cryptography and Information Security (IJCIS) 10, no. 1 (2020): 1–9. https://doi.org/10.5281/zenodo.3743084.

Full text
Abstract:
Cloud ERP is a new concept that has caught the attention of researchers and industry players. One of the major challenges towards migrating ERP data to cloud is security and confidentiality. A number of secret sharing schemes (SSS) have been proposed Mignote, Asmuth-Bloom, Shamir and Blakley but not without challenges. In this research we proposed an efficient threshold cryptography scheme to secure cloud ERP data. We modified the Asmuth-Bloom SSS and applied it to cloud ERP data.
APA, Harvard, Vancouver, ISO, and other styles
39

Rodriguez, Stephen, and Paolina Centonze. "Multi-Layered Dynamic Encryption Security Scheme for Cloud Data Storage." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 16, no. 3 (2017): 6233–39. http://dx.doi.org/10.24297/ijct.v16i3.6150.

Full text
Abstract:
This journal article discusses our Dynamic Encryption Key Security Scheme (DEKSS) and the purpose it serves in providing a new security architecture for protecting databases used in technology stacks involving Mobile and Cloud based devices. Our security scheme is a novel architectural strategy that implements a full-stack architecture for the dispatching and management of data between several Cloud Service Providers (CSP) and any number of mobile devices. This strategy can promise data security needs for both mobile devices and cloud service providers without impacting the security requiremen
APA, Harvard, Vancouver, ISO, and other styles
40

B., Rakesh, Lalitha K., Sushama C., Parveen Sultana H., and Rajitha O. "Distributed scheme to authenticate data storage security in cloud computing." Bulletin of Electrical Engineering and Informatics 8, no. 2 (2019): 683–89. https://doi.org/10.11591/eei.v8i2.1475.

Full text
Abstract:
Cloud computing is the revolution in current generation IT enterprise displaces database and application software to the large data centers for IT services. In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features. Homomorphic token is used for distributed verification of erasure&ndash;coded data. By using this scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, d
APA, Harvard, Vancouver, ISO, and other styles
41

Li, Xiuguang, Zhengge Yi, Ruifeng Li, Xu-An Wang, Hui Li, and Xiaoyuan Yang. "SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios." Sensors 23, no. 9 (2023): 4307. http://dx.doi.org/10.3390/s23094307.

Full text
Abstract:
With the rapid development of cloud storage and cloud computing technology, users tend to store data in the cloud for more convenient services. In order to ensure the integrity of cloud data, scholars have proposed cloud data integrity verification schemes to protect users’ data security. The storage environment of the Internet of Things, in terms of big data and medical big data, demonstrates a stronger demand for data integrity verification schemes, but at the same time, the comprehensive function of data integrity verification schemes is required to be higher. Existing data integrity verifi
APA, Harvard, Vancouver, ISO, and other styles
42

Wang, Hong Hua. "Study of Data Security Based on Cloud Computing." Advanced Materials Research 756-759 (September 2013): 1097–100. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1097.

Full text
Abstract:
This paper analysis the core problem of cloud computing: data secure problem, using the newly development of cryprology: fully homomorphism encrytion (FHE) to protect cloud computing data. Put forward data secure scheme based on the character that FHE can operate encrypted data. This scheme not only protect the data, but also can assure the efficency of the application.
APA, Harvard, Vancouver, ISO, and other styles
43

Jarwal, Abhimanyu, Kamlesh Kumar, and Ajay Kumar. "Secure Data Encryption Scheme for Cloud Computing." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 897–902. http://dx.doi.org/10.22214/ijraset.2023.51058.

Full text
Abstract:
Abstract: The cloud computing is the architecture in which no central controller is present due to which various breaches occurred in the network. To secure data transmission from source to destination two type of encryption schemes i.e: fully homomorphism and fully disk encryption are introduced. The fully homomorhic encryption scheme is more security and light as compared to fully disk encryption. In the paper, improvement in the fully homomorphic encryption is proposed using elliptic curve cryptography and OTP generation.
APA, Harvard, Vancouver, ISO, and other styles
44

Hao Yan, Hao Yan, Yanan Liu Hao Yan, Dandan Huang Yanan Liu, Shuo Qiu Dandan Huang, and Zheng Zhang Shuo Qiu. "Public Integrity Verification for Cloud Storage with Efficient Key-update." 網際網路技術學刊 24, no. 6 (2023): 1263–71. http://dx.doi.org/10.53106/160792642023112406009.

Full text
Abstract:
&lt;p&gt;To improve the security of the data on cloud storage, numbers of data integrity auditing schemes have been proposed in the past several years. However, there only a few schemes considered the security challenge that the user’s key is exposed unknowingly which is very likely to happen in real-life. To cope with the problem, we propose a public data integrity auditing scheme for cloud storage with efficient key updating. In our scheme, the user’s key is updated periodically to resist the risk of key exposure. Meanwhile, the authentication tags of blocks are updated simultaneously with t
APA, Harvard, Vancouver, ISO, and other styles
45

Sermakani, A. M., and D. Paulraj. "Effective Data Storage and Dynamic Data Auditing Scheme for Providing Distributed Services in Federated Cloud." Journal of Circuits, Systems and Computers 29, no. 16 (2020): 2050259. http://dx.doi.org/10.1142/s021812662050259x.

Full text
Abstract:
Recently, many organizations and industries are using the cloud computing technologies for exchanging the resources and their confidential data. For this purpose, many cloud services are available and also provide the facility to categorize their users as private and public users for accessing their own data from private cloud and public cloud. The combination of these two clouds is called federated cloud which facilitates to allow both kinds of cloud users for accessing their own data on same cloud database. In this scenario, the authorization and authentication process is becoming complex ta
APA, Harvard, Vancouver, ISO, and other styles
46

D P, Sneha. "A Survey on Approach for Efficient and Secure Data Encryption Scheme for Spatial Data." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 4918–23. http://dx.doi.org/10.22214/ijraset.2022.46011.

Full text
Abstract:
Abstract: In spatial applications location data of the users continuously processed in un-trusted servers, this may cause to user privacy. Location information of the users is very sensitive data like their meeting information, residential and official location information’s. In present solutions of the un-trusted servers may have the several problems and limitation like data security, data availability, request processing etc. In general cloud environment provides lot of features to solve many problems with low cost. Elastic cloud environment will provide successful solutions for spatial data
APA, Harvard, Vancouver, ISO, and other styles
47

Liu, Ping, Syed Hamad Shirazi, Wei Liu, and Yong Xie. "pKAS: A Secure Password-Based Key Agreement Scheme for the Edge Cloud." Security and Communication Networks 2021 (October 18, 2021): 1–10. http://dx.doi.org/10.1155/2021/6571700.

Full text
Abstract:
For the simplicity and feasibility, password-based authentication and key agreement scheme has gradually become a popular way to protect network security. In order to achieve mutual authentication between users and edge cloud servers during data collection, password-based key agreement scheme has attracted much attention from researchers and users. However, security and simplicity are a contradiction, which is one of the biggest difficulties in designing a password-based key agreement scheme. Aimed to provide secure and efficient key agreement schemes for data collecting in edge cloud, we prop
APA, Harvard, Vancouver, ISO, and other styles
48

Yadav, Meenu. "A Dual Encryption Scheme for Network Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29746.

Full text
Abstract:
Cloud computing is an emergent part in the arena of IT. Nowadays, a good amount of fast, advanced and challenging technologies are available in cloud computing for accessing, sharing, and transmitting large data over the network. Along with this growth, the existence of data hackers and attackers has also increased. Every organization always seeks error free and secured data transmission over the cloud. Moreover, the users also expect their data, stored on to the cloud should be more secured, confidential, and authorized. The server stores the encrypted data and it is decrypted at client side.
APA, Harvard, Vancouver, ISO, and other styles
49

Tian, Qiuting, Dezhi Han, and Yanmei Jiang. "Hierarchical authority based weighted attribute encryption scheme." Computer Science and Information Systems 16, no. 3 (2019): 797–813. http://dx.doi.org/10.2298/csis180912027t.

Full text
Abstract:
With the development of cloud storage technology, data storage security has become increasingly serious. Aiming at the problem that existing attribute-based encryption schemes do not consider hierarchical authorities and the weight of attribute. A hierarchical authority based weighted attribute encryption scheme is proposed. This scheme will introduce hierarchical authorities and the weight of attribute into the encryption scheme, so that the authorities have a hierarchical relationship and different attributes have different importance. At the same time, the introduction of the concept of wei
APA, Harvard, Vancouver, ISO, and other styles
50

Sheng, Luo. "User Privacy Protection Scheme Based on Verifiable Outsourcing Attribute-Based Encryption." Security and Communication Networks 2021 (August 16, 2021): 1–11. http://dx.doi.org/10.1155/2021/6617669.

Full text
Abstract:
Given the rapid development of cloud computing and cloud storage technology, a growing number of enterprises and individuals use cloud storage services to save data or back up data. In the cloud storage services, although attribute-based encryption can protect users’ data security, the computational cost of key generation, data encryption, and data decryption linearly increases with the complexity of access strategies, which becomes more critical for resource-constrained users. Therefore, this paper proposes a verifiable attribute-based encryption scheme for a fully outsourced ciphertext polic
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!