Results 1 - 10
of
891
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
- In INFOCOM
, 2010
"... Abstract. Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relie ..."
Abstract
-
Cited by 135 (1 self)
- Add to MetaCart
user data privacy. In this paper, we utilize the public key based homomorphic authenticator and uniquely integrate it with random mask technique to achieve a privacy-preserving public auditing system for cloud data storage security while keeping all above requirements in mind. To support efficient
Pors: proofs of retrievability for large files
- In CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security
, 2007
"... Abstract. In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient fo ..."
Abstract
-
Cited by 254 (8 self)
- Add to MetaCart
for the user to recover F in its entirety. A POR may be viewed as a kind of cryptographic proof of knowledge (POK), but one specially designed to handle a large file (or bitstring) F. We explore POR protocols here in which the communication costs, number of memory accesses for the prover, and storage
A Pivoting Algorithm for Convex Hulls and Vertex Enumeration of Arrangements and Polyhedra
, 1990
"... We present a new piv ot-based algorithm which can be used with minor modification for the enumeration of the facets of the convex hull of a set of points, or for the enumeration of the vertices of an arrangement or of a convex polyhedron, in arbitrary dimension. The algorithm has the following prope ..."
Abstract
-
Cited by 223 (29 self)
- Add to MetaCart
properties: (a) No additional storage is required beyond the input data; (b) The output list produced is free of duplicates; (c) The algorithm is extremely simple, requires no data structures, and handles all degenerate cases; (d) The running time is output sensitive for non-degenerate inputs; (e
DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds
, 2013
"... The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these services for their storage needs. Medical record databases, large biomedical datasets, historical information about power systems and financial data are some examples of critic ..."
Abstract
-
Cited by 85 (15 self)
- Add to MetaCart
The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these services for their storage needs. Medical record databases, large biomedical datasets, historical information about power systems and financial data are some examples
Towards Data Handling Requirements-aware Cloud Computing,”
- in IEEE CloudCom,
, 2013
"... Abstract-The adoption of the cloud computing paradigm is hindered by severe security and privacy concerns which arise when outsourcing sensitive data to the cloud. One important group are those concerns regarding the handling of data. On the one hand, users and companies have requirements how their ..."
Abstract
-
Cited by 3 (3 self)
- Add to MetaCart
the challenges for enabling data handling requirements awareness in the (inter-)cloud. To this end, we show how to extend a data storage service, AppScale, and Cassandra to follow data handling requirements. Thus, we make an important step towards data handling requirements-aware cloud computing.
EMBEDDED SCRIPT PROCESSING FOR HANDLING KEY DELEGATES IN CLOUD STORAGE
"... Cloud Infra contains a collection of storage servers, providing an illusion of unlimited storage and accessing. Security is one of the critical components of such a system. Storing data at a remote third party’s cloud system is always causing serious concern over data confidentiality and survivabili ..."
Abstract
- Add to MetaCart
Cloud Infra contains a collection of storage servers, providing an illusion of unlimited storage and accessing. Security is one of the critical components of such a system. Storing data at a remote third party’s cloud system is always causing serious concern over data confidentiality
InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services
- Proceedings of the 10th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2010
"... Abstract. Cloud computing providers have setup several data centers at different geographical locations over the Internet in order to optimally serve needs of their customers around the world. However, existing systems do not support mechanisms and policies for dynamically coordinating load distribu ..."
Abstract
-
Cited by 132 (13 self)
- Add to MetaCart
Abstract. Cloud computing providers have setup several data centers at different geographical locations over the Internet in order to optimally serve needs of their customers around the world. However, existing systems do not support mechanisms and policies for dynamically coordinating load
HadoopDB: An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads
"... The production environment for analytical data management applications is rapidly changing. Many enterprises are shifting away from deploying their analytical databases on high-end proprietary machines, and moving towards cheaper, lower-end, commodity hardware, typically arranged in a shared-nothing ..."
Abstract
-
Cited by 180 (7 self)
- Add to MetaCart
-nothing MPP architecture, often in a virtualized environment inside public or private “clouds”. At the same time, the amount of data that needs to be analyzed is exploding, requiring hundreds to thousands of machines to work in parallel to perform the analysis. There tend to be two schools of thought
An Architecture for Secure Searchable Cloud Storage
"... Abstract—Cloud Computing is a relatively new and appealing concept; however, users may not fully trust Cloud Providers with their data and can be reluctant to store their files on Cloud Storage Services. This paper describes a solution that allows users to securely store data on a public cloud, whil ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
application performs all the security operations on the data. Along with saving and retrieving data from the Storage Service, the Server application performs the processing involved in handling the encrypted queries. The performance overheads of such a system are potentially significant in terms of additional
Bursting the cloud data bubble: Towards transparent storage elasticity in iaas clouds
- in 28th IEEE International Parallel & Distributed Processing Symposium
, 2014
"... Abstract—Storage elasticity on IaaS clouds is an important feature for data-intensive workloads: storage requirements can vary greatly during application runtime, making worst-case over-provisioning a poor choice that leads to unnecessarily tied-up storage and extra costs for the user. While the abi ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
Abstract—Storage elasticity on IaaS clouds is an important feature for data-intensive workloads: storage requirements can vary greatly during application runtime, making worst-case over-provisioning a poor choice that leads to unnecessarily tied-up storage and extra costs for the user. While
Results 1 - 10
of
891