Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Cryptographic cloud architecture.

Artykuły w czasopismach na temat „Cryptographic cloud architecture”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Cryptographic cloud architecture”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

TN, Nikhil. "Exploring on Cloud Security Landscapes:A Comprehensive Review." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34217.

Pełny tekst źródła
Streszczenie:
Nowadays, the massive growth of data and the adoption of the cloud-based architecture indicate that the secure storage of data is a very essential issue. Cloud storage is the solution to convenient, scalable and cost-effective storage, yet security issues persist, especially regarding the protection of sensitive information. The encryption plays a vital role in which data is made unreadable and only accessible by those with the proper authorization. This helps in data management and minimizes data leaks. Shared responsibility in cloud security entails collaboration between the operators and us
Style APA, Harvard, Vancouver, ISO itp.
2

Dr., R. Sridevi*1 &. C. B. Banupriya2. "A SURVEY ON CRYPTOGRAPHIC CLOUD STORAGE TECHNIQUES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 602–5. https://doi.org/10.5281/zenodo.829787.

Pełny tekst źródła
Streszczenie:
The cloud computing has become a revolution in information technology, it includes elements from grid computing, utility computing and autonomic computing into a creative deployment architecture. The web service use web service to provide high performance and easy access of storage infrastructure.In this paper a survey of existing cryptographic storage techniques and benefits in cloud computing is discussed
Style APA, Harvard, Vancouver, ISO itp.
3

Karanam, Madhavi, Sahithi Reddy S, Abhinav Chakilam, and Srinu Banothu. "Performance Evaluation of Cryptographic Security Algorithms on Cloud." E3S Web of Conferences 391 (2023): 01015. http://dx.doi.org/10.1051/e3sconf/202339101015.

Pełny tekst źródła
Streszczenie:
Cloud computing is a cost-effective approach to provide on demand computing and data storage solutions. Data storage is one of the key services provided by the cloud. Cloud offers improved efficiency, flexibility, and scalability, but all these advantages can be overturned if security is not taken into consideration. It is the cloud vender’s responsibility to keep the data safe with highly secure cloud services, which helps them earn the trust of the customers. Today, cloud security is critical since most organizations are already using cloud computing in alternate forms. There is always a con
Style APA, Harvard, Vancouver, ISO itp.
4

Thakur, Gaurav. "Enhancing Secure Cloud Storage: A Four-Tier Architecture with ChaCha20 Encryption, Blake3 Hashing, and Dynamic Chunk Allocation in Multi-Cloud Environment." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 497–507. https://doi.org/10.22214/ijraset.2025.70183.

Pełny tekst źródła
Streszczenie:
With the growing reliance on cloud computing for storing and managing data, providing security and performance for cloud storage systems has become very important and multicloud solutions offers both. Current cloud architectures suffer from scalability, security, and efficiency issues in distributed cloud systems. In this paper, we introduce a ChaCha20-encryption, a fast stream cipher and Blake3, an adaptive cryptographic hash function, and dynamic chunk allocation to an existing architecture that progressively improves data confidentiality, integrity, and redundancy. The experiment focuses on
Style APA, Harvard, Vancouver, ISO itp.
5

Hathout, Basma Badawi, Samy Ghoniemy, and Osman Ibrahim. "A Modified Cloud-Based Cryptographic Agent for Cloud Data Integrity." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 2 (2017): 6. http://dx.doi.org/10.3991/ijim.v11i2.6553.

Pełny tekst źródła
Streszczenie:
In spite of all the advantages delivered by cloud computing, several challenges are hindering the migration of customer software and data into the cloud. On top of the list is the security and privacy concerns arising from the storage and processing of sensitive data on remote machines that are not owned, or even managed by the customers themselves. In this paper, initially a homomorphic encryption-based Cryptographic Agent is proposed. The proposed Cryptographic Agent is based on Paillier scheme, and is supported by user-configurable software protection and data privacy categorization agents,
Style APA, Harvard, Vancouver, ISO itp.
6

Aiello, Samuel. "How Cryptography Can Augment Zero Trust." International Journal of Blockchain Technologies and Applications 1, no. 1 (2023): 52–60. http://dx.doi.org/10.18178/ijbta.2023.1.1.52-60.

Pełny tekst źródła
Streszczenie:
The scope of this work presents the security architecture of the Cloud provider/consumer and showcases how “Cryptography” augments the Zero Trust Architecture security strategy. In addition, this work will delve into enforcing the minimum expected set of security controls that assures secure isolation, data protection, access control and monitoring/logging at all tiers of the hosted applications. Cryptographic solutions play an important role in the cloud environment in which customers hand over data to a cloud provider for storage, and processing. One of the biggest hurdles for the adoption o
Style APA, Harvard, Vancouver, ISO itp.
7

Bhuite, Prof S. S. "A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47316.

Pełny tekst źródła
Streszczenie:
Abstract— This paper introduced a robust and efficient framework designed to ensure secure dynamic data handling and public auditing in cloud storage systems. The primary goal was to strengthen data integrity and user confidentiality using advanced cryptographic methods and privacy-aware third-party auditing (TPA). An in- depth analysis of existing cloud security models was conducted to uncover persistent challenges such as secure management of data updates, protection of user privacy, and reliable auditing within potentially untrusted cloud environments. To address these issues, a modular sys
Style APA, Harvard, Vancouver, ISO itp.
8

Abhale, Babasaheb Annasaheb, and Rohita Yamaganti Dr. "Mitigating cybersecurity risks in cloud computing through cryptographic protocols and service architecture." International Journal of Trends in Emerging Research and Development 2, no. 6 (2024): 153–59. https://doi.org/10.5281/zenodo.15239402.

Pełny tekst źródła
Streszczenie:
The capabilities of cloud computing have moved the IT industry forward, with large enterprises migrating their processing and storage to it. One mainstream service mode for public cloud computing is Infrastructure as a Service (IaaS) public cloud. Cloud computing has several advantages when it comes to cyber-security, but one of the main ones is the heightened security measures offered by reputable CSPs Cloud computing is continuously altering how organizations store, use, and share software, workloads, and data Cloud computing is a cutting-edge technological development with huge worldwide im
Style APA, Harvard, Vancouver, ISO itp.
9

Chen, Yilin. "Comparative Analysis of the Centralized and Decentralized Architecture of Cloud Computing in terms of Privacy Security." Applied and Computational Engineering 145, no. 1 (2025): 51–56. https://doi.org/10.54254/2755-2721/2025.21867.

Pełny tekst źródła
Streszczenie:
In an era of rapid technological evolution, cloud computing has become indispensable across various industries due to its cost-efficiency, scalability, and accessibility. Yet, privacy and security concerns persist, as sensitive data can be susceptible to breaches and unauthorized access. At present, the two mainstream cloud computing architectures are centralized architecture and decentralized architecture. Both have advantages and disadvantages in terms of confidentiality, integrity and data availability. This paper employs a comparative analysis of these two architectures, synthesizing insig
Style APA, Harvard, Vancouver, ISO itp.
10

Fairosebanu, Abdul Azis, and Antony Cruz Nisha Jebaseeli. "Data security in cloud environment using cryptographic mechanism." Bulletin of Electrical Engineering and Informatics 12, no. 1 (2023): 462–71. http://dx.doi.org/10.11591/eei.v12i1.4590.

Pełny tekst źródła
Streszczenie:
Virtual computing resources are provided via a cloud system that is both clever and intelligent. Based on the user's request, computing resources are made available. A hybrid cloud is the best option for storing and accessing user data for cloud deployments. Maintaining security in a hybrid cloud environment is time-consuming. This study provides a novel strategy for securing data in the hybrid cloud by ensuring the user's data is protected. Users' data in a hybrid cloud is protected using cryptographic approaches provided in this approach. Using this strategy, users' data may be protected in
Style APA, Harvard, Vancouver, ISO itp.
11

Gaurav, Raj1 and Kamaljit Kaur2. "Secure Cloud Communication for Effective Cost Management System through MSBE." International Journal on Cloud Computing: Services and Architecture(IJCCSA) 2, June (2018): 01–12. https://doi.org/10.5281/zenodo.1440834.

Pełny tekst źródła
Streszczenie:
In Cloud Computing Architecture, Brokers are responsible to provide services to the end users. An Effective Cost Management System (ECMS) which works over Secure Cloud Communication Paradigm (SCCP) helps in finding a communication link with overall minimum cost of links. We propose an improved Broker Cloud Communication Paradigm (BCCP) with integration of security issues. Two algorithms are included, first is Secure Optimized Route Cost Finder (S-ORCF) to find optimum route between broker and cloud on the behalf of cost factor and second is Secure Optimized Route Management (S-ORM) to maintain
Style APA, Harvard, Vancouver, ISO itp.
12

Badr, Aymen Mudheher, Yi Zhang, and Hafiz Gulfam Ahmad Umar. "Dual Authentication-Based Encryption with a Delegation System to Protect Medical Data in Cloud Computing." Electronics 8, no. 2 (2019): 171. http://dx.doi.org/10.3390/electronics8020171.

Pełny tekst źródła
Streszczenie:
The increasing use of cloud computing, especially in commercial, government and healthcare institutions, started with the use of computerized clouds. Clouds store important data, which reduces the cost of management and ensures easy access. To protect this data, cryptographic methods are used to ensure confidentiality of the data, as well as to secure access to user data and increase trust in cloud technology. In our paper, we suggest a new scheme to support an attribute-based encryption system (ABE) that involves multiple parties such as data owners, data users, cloud servers and authority. A
Style APA, Harvard, Vancouver, ISO itp.
13

Mohammad Asad Hussain. "Blockchain for secure data integration in multi-cloud and hybrid cloud systems." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 743–53. https://doi.org/10.30574/wjarr.2025.26.2.1658.

Pełny tekst źródła
Streszczenie:
This article presents a comprehensive framework for applying blockchain technology to secure data integration challenges in multi-cloud and hybrid-cloud environments. This article examines how distributed ledger technology creates a trust layer that addresses key vulnerabilities in traditional integration approaches while maintaining performance characteristics suitable for enterprise deployments. This article's architecture leverages permissioned blockchain networks, smart contracts, and cryptographic verification mechanisms to ensure data integrity, enforce governance policies, and provide i
Style APA, Harvard, Vancouver, ISO itp.
14

Arunkumar, R. Josephius, and R. Anbuselvi. "An Enhanced Methodology to Protect the Patient Healthcare Records Using Multi-Cloud Approach." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (2017): 239. http://dx.doi.org/10.23956/ijarcsse.v7i8.57.

Pełny tekst źródła
Streszczenie:
Now-a-days, most hospitals and medical centers is to manage huge volume of patient’s medical records into database. It is essential to collect and access this information everywhere, to increase productivity and improve quality of health cares. Need to access electronic health information across the world and improve the quality of healthcare to patients will highlight importance of using cloud computing architecture in this area. But, despite the benefits of cloud computing applications for health care, the security challenges of cloud should be addressed. In this paper, we introduce and desc
Style APA, Harvard, Vancouver, ISO itp.
15

Lin, Han-Yu, and Yan-Ru Jiang. "A Multi-User Ciphertext Policy Attribute-Based Encryption Scheme with Keyword Search for Medical Cloud System." Applied Sciences 11, no. 1 (2020): 63. http://dx.doi.org/10.3390/app11010063.

Pełny tekst źródła
Streszczenie:
Population aging is currently a tough problem of many countries. How to utilize modern technologies (including both information and medical technologies) to improve the service quality of health information is an important issue. Personal Health Record (PHR) could be regarded as a kind of health information records of individuals. A ciphertext policy attribute-based encryption (CP-ABE) is a cryptographic primitive for fine-grained access control of outsourced data in clouds. In order to enable patients to effectively store his medical records and PHR data in medical clouds, we propose an impro
Style APA, Harvard, Vancouver, ISO itp.
16

Muneera, M. Nafees, G. Anbu Selvi, V. Vaissnave, and Gopal Lal Rajora. "A Cryptographic based I2ADO-DNN Security Framework for Intrusion Detection in Cloud Systems." International Journal of Computer Network and Information Security 15, no. 6 (2023): 40–51. http://dx.doi.org/10.5815/ijcnis.2023.06.04.

Pełny tekst źródła
Streszczenie:
Cloud computing's popularity and success are directly related to improvements in the use of Information and Communication Technologies (ICT). The adoption of cloud implementation and services has become crucial due to security and privacy concerns raised by outsourcing data and business applications to the cloud or a third party. To protect the confidentiality and security of cloud networks, a variety of Intrusion Detection System (IDS) frameworks have been developed in the conventional works. However, the main issues with the current works are their lengthy nature, difficulty in intrusion det
Style APA, Harvard, Vancouver, ISO itp.
17

Shamshad, Shuhab, Farina Riaz, Rabia Riaz, Sanam Shahla Rizvi, and Shahab Abdulla. "An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy." Sensors 22, no. 21 (2022): 8151. http://dx.doi.org/10.3390/s22218151.

Pełny tekst źródła
Streszczenie:
The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications. Considering the significant value of public-key cryptography threats on IoT system confidentiality, it is vital to secure it. One of the potential candidates to assist in securing public key cryptography in IoT is quantum computing. Although the notion of IoT and quantum computing convergence is not new, it has been referenced in various works of literature and covered by many scholars. Quantum computing el
Style APA, Harvard, Vancouver, ISO itp.
18

Neethu V A. "Enhancing Data Privacy and Integrity in Cloud Systems Through Blockchain and Quantum Cryptographic Integration." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 327–37. https://doi.org/10.52783/jisem.v10i16s.2599.

Pełny tekst źródła
Streszczenie:
Cloud computing's rise has brought with it concerns about data privacy and integrity as a result of an increase in cyber threats as well as centralized security weaknesses. To resolve the problem, this project combines Blockchain and quantum cryptography as a single work. Blockchain is famous for its decentralization. It promises transparency and resistance to manipulation with its open, unchangeable ledger. Quantum cryptography with Quantium Key Distribution (QKD) defends against both present and future quantum computer invaders. Using this technology, the project aims to enhance cloud data p
Style APA, Harvard, Vancouver, ISO itp.
19

Neethu V A, Arun Vaishnav, Mohammad Akram Khan. "Enhancing Data Privacy and Integrity in Cloud Systems Through Blockchain and Quantum Cryptographic Integration." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 52–62. https://doi.org/10.52783/jisem.v10i16s.2559.

Pełny tekst źródła
Streszczenie:
Cloud computing's rise has brought with it concerns about data privacy and integrity as a result of an increase in cyber threats as well as centralized security weaknesses. To resolve the problem, this project combines Blockchain and quantum cryptography as a single work. Blockchain is famous for its decentralization. It promises transparency and resistance to manipulation with its open, unchangeable ledger. Quantum cryptography with Quantium Key Distribution (QKD) defends against both present and future quantum computer invaders. Using this technology, the project aims to enhance cloud data p
Style APA, Harvard, Vancouver, ISO itp.
20

Vani, K. H., and Dr P. Balamurugan. "Comparative Analysis of Trust-Based Data Storage Management Techniques in Dynamic Cloud Service." International Journal of Basic and Applied Sciences 14, no. 3 (2025): 258–65. https://doi.org/10.14419/vbn70d23.

Pełny tekst źródła
Streszczenie:
Cloud computing (CC) has emerged as a transformative paradigm for data storage and service delivery. However, challenges in ‎trust management, data confidentiality, and quality assurance continue to limit its scalability and user adoption. To address these ‎limitations, this study proposes a Triple-layered Trust Evaluation Model (TTEM) that integrates trust computation, optimized ‎cryptographic key generation, and a layered architecture comprising edge, fog, and cloud nodes. The model dynamically ‎evaluates service providers based on multiple Quality of Service (QoS) attributes—such as bandwid
Style APA, Harvard, Vancouver, ISO itp.
21

Vijai, Anand Ramar, and Kumar R. Veerandra. "ENHANCING DATA PRIVACY AND SECURITY IN CLOUD HEALTHCARE SOLUTIONS USING ELLIPTIC CURVE CRYPTOGRAPHY (ECC)." International Journal Of Engineering Technology Research & Management (IJETRM) 03, no. 05 (2019): 133–43. https://doi.org/10.5281/zenodo.15600580.

Pełny tekst źródła
Streszczenie:
The rapid adoption of cloud computing in healthcare has revolutionized medical data management by providingscalability, interoperability, and remote access. The change has also increased privacy and security riskssimultaneously, particularly with the sensitive nature of patient health information and the proliferation of IoTbased medical devices. a secure and light-weight cloud healthcare model founded on Elliptic Curve Cryptography(ECC) for maintaining confidentiality and integrity of electronic health information entire lifecycle—collection,cloud storage and authorized retrieval.The ar
Style APA, Harvard, Vancouver, ISO itp.
22

prasanna,, G. Laxmi. "PRIVACY PRESERVING DATA SHARING CLOUD-BASED HEALTHCARE SYSTEMS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40474.

Pełny tekst źródła
Streszczenie:
The integration of cloud computing into healthcare systems has revolutionized data management by enabling seamless data sharing and enhanced accessibility, thereby improving patient outcomes and operational efficiency. However, the sensitive nature of healthcare data necessitates robust privacy-preserving mechanisms to protect patient confidentiality. This paper explores state-of-the-art techniques such as cryptography, data anonymization, and secure access control, which are tailored to address privacy challenges in healthcare environments. It also critically evaluates existing frameworks, id
Style APA, Harvard, Vancouver, ISO itp.
23

V Uday Kumar and Kaila Shahu Chatrapati. "Hybrid Hash Trees in Blockchain: Evaluating Algorithm Combinations for Speed and Security." International Journal of Scientific Research in Science, Engineering and Technology 12, no. 3 (2025): 1356–66. https://doi.org/10.32628/ijsrset2512181.

Pełny tekst źródła
Streszczenie:
Blockchain technology relies heavily on cryptographic hashing for ensuring data integrity, transaction security, and tamper resistance. However, with increasing data volume and demand for real-time processing, traditional hashing mechanisms often struggle to balance speed and security. This paper proposes and evaluates a novel Hybrid Hash Tree architecture that integrates multiple hash algorithms to optimize both performance and cryptographic strength. By combining the efficiency of lightweight hash functions with the robustness of secure hashing algorithms, the hybrid model aims to accelerate
Style APA, Harvard, Vancouver, ISO itp.
24

Gouru, Navya, and NagaLakshmi Vadlamani. "DistProv-Data Provenance in Distributed Cloud for Secure Transfer of Digital Assets with Ethereum Blockchain using ZKP." International Journal of Open Source Software and Processes 10, no. 3 (2019): 1–18. http://dx.doi.org/10.4018/ijossp.2019070101.

Pełny tekst źródła
Streszczenie:
The importance and usage of the distributed cloud is increasing rapidly over a traditionally centralized cloud for the storing and exchanging of digital assets between untrusted parties in many business sectors. Storing the digital assets in the distributed cloud is considered superior to traditional cloud computing in terms of environmentally friendly, cost, security and other technical dimensions. In this article, a contemporary architecture DistProv is proposed where an open source distributed cloud IPFS is used to store and transfer the digital assets between the consignor and consignee. T
Style APA, Harvard, Vancouver, ISO itp.
25

Yakoob, S. K., and V. Krishna Reddy. "Efficient Identity-Based Multi-Cloud Security Access Control in Distributed Environments." International Journal of e-Collaboration 19, no. 3 (2023): 1–13. http://dx.doi.org/10.4018/ijec.316771.

Pełny tekst źródła
Streszczenie:
Distributed computing is a forceful idea in disseminated registering which depicts versatile information to the executives for a minimal price dependent on client interest to various business associations. Because of multi-cloud identity-based encryption over distributed environment, in this document, the authors present and implement a novel identity-based multi-cloud security access control approach (NIMSACPA) for efficient security in multi data security and privacy based on three basic parametric concepts: 1) open minded security between autonomous user privacy using Byzantine protocol, 2)
Style APA, Harvard, Vancouver, ISO itp.
26

Muddumadappa, Parashiva Murthy Basavanapura, Sumithra Devi Kengeri Anjanappa, and Mallikarjunaswamy Srikantaswamy. "An Efficient Reconfigurable Cryptographic Model for Dynamic and Secure Unstructured Data Sharing in Multi-Cloud Storage Server." Journal of Intelligent Systems and Control 1, no. 1 (2022): 68–78. http://dx.doi.org/10.56578/jisc010107.

Pełny tekst źródła
Streszczenie:
This study designs a reconfigurable multi-cloud storage server architecture for dynamic and secure data sharing has been designed, improves the security of unstructured data using cryptographic index-based data slicing (CIBDS), and reduces the malicious insider through data encryption using a third data encryption algorithm (3DEA). Focusing on multi-cloud storage server (MCSS) and data life cycle which includes three stages (i.e., data input, transition and utilization), the authors determined the efficiency of reconfigurable data file slicing, standard format, privacy and trustworthiness of t
Style APA, Harvard, Vancouver, ISO itp.
27

Qiao, Huidong, Haihe Ba, Huaizhe Zhou, Zhiying Wang, Jiangchun Ren, and Ying Hu. "Practical, Provably Secure, and Black-Box Traceable CP-ABE for Cryptographic Cloud Storage." Symmetry 10, no. 10 (2018): 482. http://dx.doi.org/10.3390/sym10100482.

Pełny tekst źródła
Streszczenie:
Cryptographic cloud storage (CCS) is a secure architecture built in the upper layer of a public cloud infrastructure. In the CCS system, a user can define and manage the access control of the data by himself without the help of cloud storage service provider. The ciphertext-policy attribute-based encryption (CP-ABE) is considered as the critical technology to implement such access control. However, there still exists a large security obstacle to the implementation of CP-ABE in CCS. That is, how to identify the malicious cloud user who illegally shares his private keys with others or applies hi
Style APA, Harvard, Vancouver, ISO itp.
28

Chhaybi, Akram, and Saiida Lazaar. "Definition of a lightweight cryptographic solution to secure health data on IoT and cloud." General Letters in Mathematics 10, no. 2 (2021): 54–60. http://dx.doi.org/10.31559/glm2021.10.2.6.

Pełny tekst źródła
Streszczenie:
The Internet of Things (IoT) and the Cloud Computing are among the main technologies influencing the quality and efficiency of our social and economic activities. Their importance is quite notable in several areas such as remote medical care and healthcare monitoring systems. These later face difficulties most of them are the expensive costs for the chronic diseases and the hospitals charges specially during the pandemic time. All these issues have led to the creation of new solutions for enhancing the quality of the healthcare systems. In this paper, we focus on the network architecture secur
Style APA, Harvard, Vancouver, ISO itp.
29

Mr G shekar, Asthami Sai Kiran, Muthe Harish, and Padala Sai Rahul. "Multi tenancy cloud data with a shared privacy preserving trusted keyword search." International Journal of Information Technology and Computer Engineering 13, no. 2 (2025): 1290–95. https://doi.org/10.62647/ijitce2025v13i2pp1290-1295.

Pełny tekst źródła
Streszczenie:
In today's cloud computing environment, secure and efficient data sharing is paramount. This project proposes a secure cloud-based data sharing and verification system using the Verifiable yet Accountable Keyword Searchable Encryption (VAKSE) scheme. The system architecture is divided into four modules involving the Cloud Service Provider (CSP), Verifier, Data Owner, and Client, each playing a key role in secure data handling and verification. The first module focuses on the Cloud Service Provider (CSP), which manages user login, stores data owner and client details, generates cryptographic ke
Style APA, Harvard, Vancouver, ISO itp.
30

Chaudhari, Prithvi, Ji-Jian Chin, and Soeheila Moesfa Mohamad. "An In-Depth Analysis on Efficiency and Vulnerabilities on a Cloud-Based Searchable Symmetric Encryption Solution." Journal of Informatics and Web Engineering 3, no. 1 (2024): 265–76. http://dx.doi.org/10.33093/jiwe.2024.3.1.19.

Pełny tekst źródła
Streszczenie:
Searchable Symmetric Encryption (SSE) has come to be as an integral cryptographic approach in a world where digital privacy is essential. The capacity to search through encrypted data whilst maintaining its integrity meets the most important demand for security and confidentiality in a society that is increasingly dependent on cloud-based services and data storage. SSE offers efficient processing of queries over encrypted datasets, allowing entities to comply with data privacy rules while preserving database usability. Our research goes into this need, concentrating on the development and thor
Style APA, Harvard, Vancouver, ISO itp.
31

Marwan, Mbarek, Abdelkarim Ait Temghart, Fatima Sifou, and Feda AlShahwan. "A Cloud Solution for Securing Medical Image Storage." Journal of information and organizational sciences 44, no. 1 (2020): 113–39. http://dx.doi.org/10.31341/jios.44.1.5.

Pełny tekst źródła
Streszczenie:
Cloud computing is an easy-to-use, affordable solution to manage and analyze medical data. Therefore, this paradigm has gained wide acceptance in the healthcare sector as a cost-efficient way for a successful Electronic Medical Records (EMR) implementation. Cloud technology is, however, subject to increasing criticism because of the numerous security vulnerabilities. In this regard, we propose a framework to protect confidential data through the development of new security measures, including compression, secret share scheme and XOR operation. The primary objective of the proposal is to achiev
Style APA, Harvard, Vancouver, ISO itp.
32

Krishnan, Ponnarasan. "IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing." International Journal of Science and Research (IJSR) 13, no. 9 (2024): 1349–63. http://dx.doi.org/10.21275/sr24922232225.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Rehman, Saba, Nida Talat Bajwa, Munam Ali Shah, Ahmad O. Aseeri, and Adeel Anjum. "Hybrid AES-ECC Model for the Security of Data over Cloud Storage." Electronics 10, no. 21 (2021): 2673. http://dx.doi.org/10.3390/electronics10212673.

Pełny tekst źródła
Streszczenie:
A cloud computing environment provides a cost-effective way for the end user to store and access private data over remote storage using some Internet connection. The user has access to the data anywhere and at any time. However, the data over the cloud do not remain secure all the time. Since the data are accessible to the end user only by using the interference of a third party, it is prone to breach of authentication and integrity of the data. Moreover, cloud computing allows simultaneous users to access and retrieve their data online over different Internet connections, which leads to the e
Style APA, Harvard, Vancouver, ISO itp.
34

Wang, Xu An, Jianfeng Ma, Fatos Xhafa, Mingwu Zhang, and Xiaoshuang Luo. "Cost-effective secure E-health cloud system using identity based cryptographic techniques." Future Generation Computer Systems 67 (February 2017): 242–54. http://dx.doi.org/10.1016/j.future.2016.08.008.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Berlato, Stefano, Roberto Carbone, Adam J. Lee, and Silvio Ranise. "Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud." ACM Transactions on Privacy and Security 25, no. 1 (2022): 1–37. http://dx.doi.org/10.1145/3474056.

Pełny tekst źródła
Streszczenie:
To facilitate the adoption of cloud by organizations, Cryptographic Access Control (CAC) is the obvious solution to control data sharing among users while preventing partially trusted Cloud Service Providers (CSP) from accessing sensitive data. Indeed, several CAC schemes have been proposed in the literature. Despite their differences, available solutions are based on a common set of entities—e.g., a data storage service or a proxy mediating the access of users to encrypted data—that operate in different (security) domains—e.g., on-premise or the CSP. However, the majority of these CAC schemes
Style APA, Harvard, Vancouver, ISO itp.
36

Santhosh Kumar, P., and Latha Parthiban. "Scalable Anomaly Detection for Large-Scale Heterogeneous Data in Cloud Using Optimal Elliptic Curve Cryptography and Gaussian Kernel Fuzzy C-Means Clustering." Journal of Circuits, Systems and Computers 29, no. 05 (2019): 2050074. http://dx.doi.org/10.1142/s0218126620500747.

Pełny tekst źródła
Streszczenie:
In most systems, a smart functionality is enabled through an essential vital service such as detecting anomalies from complex, large-scale and dynamic data. However, ensuring the privacy and security for the cloud data is the most crucial and challenging task in the present world. Moreover, it is important to safeguard the security of sensitive data and its privacy from unauthorized parties who are trying to access the data. Therefore, to accomplish this task, several encryption, decryption and key generation mechanisms were introduced in the existing works for privacy preserving in cloud plat
Style APA, Harvard, Vancouver, ISO itp.
37

Goyal, Mani, and Avinash Sharma. "A Framework for Assessing Security Strength of Cloud Computing Service." Journal of Computational and Theoretical Nanoscience 16, no. 10 (2019): 4389–93. http://dx.doi.org/10.1166/jctn.2019.8530.

Pełny tekst źródła
Streszczenie:
Cloud computing is mentioned to evolve dynamically and cloud transformation is getting easier all the time. Different cloud aspects are emerging in an efficient manner and have the potential to transform the traditional way of computing. With the advent of data sharing in cloud computing, the demand for outsourcing data has rapidly increased in the last decade. However, several security and privacy challenges exist impeding the acceptance of cloud computing. A highly secure system is required to guard an organizational entity, its resources, and assets. In this article, we propose and implemen
Style APA, Harvard, Vancouver, ISO itp.
38

Chen, Guo You, Jia Jia Miao, Feng Xie, and Han Dong Mao. "A Framework for Storage Security in Cloud Computing." Applied Mechanics and Materials 278-280 (January 2013): 1767–70. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.1767.

Pełny tekst źródła
Streszczenie:
Cloud computing has been a hot researching area of computer network technology, since it was proposed in 2007. Cloud computing also has been envisioned as the next-generation architecture of IT Enterprise [1]. Cloud computing infrastructures enable companies to cut costs by outsourcing computations on-demand. It moves the application software and database to the large data centers, where the management of the data and services may not be fully trustworthy [2]. This poses many new security challenges. In this paper, we just focus on data storage security in the cloud, which has been the most im
Style APA, Harvard, Vancouver, ISO itp.
39

Adeoye, Seun, and Russel Adams. "IoT-Enabled Secure and Scalable Cloud Architecture for Multi-User Systems: A Hybrid Post-Quantum Cryptographic and Block Chain-Based Approach towards a Trustworthy Cloud Computing." Cognizance Journal of Multidisciplinary Studies 4, no. 10 (2024): 183–209. http://dx.doi.org/10.47760/cognizance.2024.v04i10.013.

Pełny tekst źródła
Streszczenie:
Cloud computing remains one of the most significant advancements in resource provision to organizations in the latest decades since they initiate conveniences on demand access. The adoption of the IoT has brought about a new era of collaborative computing by employing a pool of linked smart sensors and devices that will produce and analyze great amounts of data, thus creating new related problems in terms of size and security, hence increasing even more the importance of traditional security measures. Therefore, in this paper, we synthesize a new SSCA that combines IoT and cryptographic mechan
Style APA, Harvard, Vancouver, ISO itp.
40

Seun, Adeoye, and Adams Russel. "IoT-Enabled Secure and Scalable Cloud Architecture for Multi-User Systems: A Hybrid Post-Quantum Cryptographic and Block Chain-Based Approach towards a Trustworthy Cloud Computing." Cognizance Journal of Multidisciplinary Studies (CJMS) 4, no. 10 (2024): 183–209. https://doi.org/10.47760/cognizance.2024.v04i10.013.

Pełny tekst źródła
Streszczenie:
Cloud computing remains one of the most significant advancements in resource provision to organizations in the latest decades since they initiate conveniences on demand access. The adoption of the IoT has brought about a new era of collaborative computing by employing a pool of linked smart sensors and devices that will produce and analyze great amounts of data, thus creating new related problems in terms of size and security, hence increasing even more the importance of traditional security measures. Therefore, in this paper, we synthesize a new SSCA that combines IoT and cryptographic mechan
Style APA, Harvard, Vancouver, ISO itp.
41

Gaud, Prof V. Y. "SeGShare: Secure Group File Sharing in the Cloud using Enclaves." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 1047–52. https://doi.org/10.22214/ijraset.2025.70327.

Pełny tekst źródła
Streszczenie:
File sharing applications using cloud storage are in- creasingly popular for personal and business use. Due to data pro- tection concerns, end-to-end encryption is often a desired feature of these applications. Many attempts at designing cryptographic solutions fail to be adopted due to missing relevant features. We present SeGShare, a new architecture for end-toend encrypted, group-based file sharing using trusted execution environments (TEE), e.g., Intel SGX. SeGShare is the first solution to protect the confidentiality and integrity of all data and management files; enforce immediate permis
Style APA, Harvard, Vancouver, ISO itp.
42

Kanimetta, Dileep Kumar. "Modernizing Financial Messaging Systems: A Technical Review of SWIFT Infrastructure Deployment on Microsoft Azure." International Journal of Computing and Engineering 7, no. 10 (2025): 17–29. https://doi.org/10.47941/ijce.2957.

Pełny tekst źródła
Streszczenie:
The global financial messaging landscape faces unprecedented challenges as traditional on-premise SWIFT infrastructures encounter significant operational limitations, escalating maintenance costs, and evolving regulatory requirements that threaten long-term viability. Microsoft Azure emerges as a transformative solution, offering comprehensive cloud services specifically designed for high-assurance financial workloads. Azure Confidential Computing provides hardware-based security enclaves protecting sensitive data during processing, while Virtual Network isolation creates secure, logically sep
Style APA, Harvard, Vancouver, ISO itp.
43

Naregal, Keerti, and Vijay Kalman. "CP-ABE Unveiled: A Path to Fine-Tuned Cloud Data Security." Journal of Cyber Security, Privacy Issues and Challenges 2, no. 2 (2023): 20–25. http://dx.doi.org/10.46610/jcspic.2023.v02i02.004.

Pełny tekst źródła
Streszczenie:
Cloud computing has revolutionized data storage and processing, but it has also introduced significant challenges in ensuring data privacy and access control. In this research paper, we explore and understand the potential of Ciphertext Policy Attribute-Based Encryption (CP-ABE) as a cryptographic solution for enhancing cloud security through fine-grained access control. Our exploration begins with a comprehensive analysis of CP-ABE, including its architecture, components, and encryption/decryption processes. We delve into the security aspects of CP-ABE, evaluating its strengths, advantages, a
Style APA, Harvard, Vancouver, ISO itp.
44

Čuřík, Peter, Roderik Ploszek, and Pavol Zajac. "Practical Use of Secret Sharing for Enhancing Privacy in Clouds." Electronics 11, no. 17 (2022): 2758. http://dx.doi.org/10.3390/electronics11172758.

Pełny tekst źródła
Streszczenie:
The topic of this contribution is the practical use of secret sharing schemes in securing private data. In the first part, we focus on the security model and the overview of the available solutions. In the second part, we describe our solution for storing sensitive data in commercial cloud storage systems, an application called Datachest. The application uploads the data in encrypted form. Cryptographic keys are divided into shares. Each cloud receives one share. This solution improves the security of users’ sensitive data in the cloud. In the final part, we explore the ramifications of secret
Style APA, Harvard, Vancouver, ISO itp.
45

Amit Kumar. "AI and edge computing: Real-time collaboration in distributed systems." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 1037–43. https://doi.org/10.30574/wjaets.2025.15.1.0214.

Pełny tekst źródła
Streszczenie:
The convergence of artificial intelligence and edge computing represents a transformative shift in distributed systems architecture, fundamentally altering how computational intelligence functions across networks. This integration addresses critical challenges in contemporary digital ecosystems, where exponential data growth overwhelms traditional cloud-centric models and necessitates real-time processing capabilities closer to data sources. Edge-based AI processing enables decision-making within milliseconds rather than hundreds of milliseconds, opening possibilities for applications previous
Style APA, Harvard, Vancouver, ISO itp.
46

Nagaraj M Lutimath, Maria Navin J. R. ,. "An Enhanced AES-ECC model with Key Dependent Dynamic S-Box for the Security of Mobile Applications using Cloud Computing." Journal of Electrical Systems 20, no. 2 (2024): 2735–46. http://dx.doi.org/10.52783/jes.2050.

Pełny tekst źródła
Streszczenie:
The spectacular growth of computational clouds has drawn attention and enabled intensive computing on client devices with constrained resources. Smart phones mostly use the data centre demand service model to provide data to computationally intensive applications. It is challenging to outsource sensitive and private information to distant data centres due to growing concerns about data privacy and security. Therefore, conventional security algorithms have to be upgraded to address the brand-new security concerns that have emerged in the cloud environment. The Advanced Encryption Standard (AES)
Style APA, Harvard, Vancouver, ISO itp.
47

Alharbi, Saud, Wasan Awad, and David Bell. "HECS4MQTT: A Multi-Layer Security Framework for Lightweight and Robust Encryption in Healthcare IoT Communications." Future Internet 17, no. 7 (2025): 298. https://doi.org/10.3390/fi17070298.

Pełny tekst źródła
Streszczenie:
Internet of Things (IoT) technology in healthcare has enabled innovative services that enhance patient monitoring, diagnostics and medical data management. However, securing sensitive health data while maintaining system efficiency of resource-constrained IoT devices remains a critical challenge. This work presents a comprehensive end-to-end IoT security framework for healthcare environments, addressing encryption at two key levels: lightweight encryption at the edge for resource-constrained devices and robust end-to-end encryption when transmitting data to the cloud via MQTT cloud brokers. Th
Style APA, Harvard, Vancouver, ISO itp.
48

Ankit Gupta. "Blockchain-Based Tokenized Storage Incentives: Revolutionizing Decentralized Object Storage." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 854–64. https://doi.org/10.32628/cseit25111289.

Pełny tekst źródła
Streszczenie:
This article presents an innovative approach to decentralized object storage that combines blockchain technology, distributed hash tables (DHTs), and advanced cryptographic techniques. The proposed system addresses the limitations of traditional centralized storage infrastructures by implementing a token-based incentive mechanism that encourages network participation while ensuring data security and availability. By integrating proof-of-storage consensus mechanisms consensus mechanisms, homomorphic encryption, and erasure coding, the architecture demonstrates superior fault tolerance and opera
Style APA, Harvard, Vancouver, ISO itp.
49

Charan Shankar Kummarapurugu. "AI-augmented blockchain for cloud data integrity assurance: Building trustworthy, tamper-proof data systems in distributed clouds." International Journal of Science and Research Archive 3, no. 1 (2021): 163–70. http://dx.doi.org/10.30574/ijsra.2021.3.1.0103.

Pełny tekst źródła
Streszczenie:
The integrity of data stored in cloud environments is a critical concern as organizations increasingly rely on distributed cloud services for their data storage and processing needs. Traditional methods of data integrity assurance, such as cryptographic hashing and third-party audits, often fail to provide the required levels of security due to their centralized nature and reliance on trust in third-party entities. This paper proposes an AI augmented blockchain framework designed to provide a robust, decentralized solution for data integrity assurance in distributed cloud environments. By inte
Style APA, Harvard, Vancouver, ISO itp.
50

Yousuf, Omerah, and Roohie Naaz Mir. "A survey on the Internet of Things security." Information & Computer Security 27, no. 2 (2019): 292–323. http://dx.doi.org/10.1108/ics-07-2018-0084.

Pełny tekst źródła
Streszczenie:
Purpose Internet of Things (IoT) is a challenging and promising system concept and requires new types of architectures and protocols compared to traditional networks. Security is an extremely critical issue for IoT that needs to be addressed efficiently. Heterogeneity being an inherent characteristic of IoT gives rise to many security issues that need to be addressed from the perspective of new architectures such as software defined networking, cryptographic algorithms, federated cloud and edge computing. Design/methodology/approach The paper analyzes the IoT security from three perspectives:
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!