• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 56
Next 10 →

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

by Cong Wang, Qian Wang, Kui Ren, Wenjing Lou - In INFOCOM , 2010
"... Abstract. Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relie ..."
Abstract - Cited by 135 (1 self) - Add to MetaCart
Abstract. Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can

Toward Secure and Dependable Storage Services in Cloud Computing

by Cong Wang, Qian Wang, Kui Ren, Ning Cao, Wenjing Lou , 2012
"... Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, whi ..."
Abstract - Cited by 40 (3 self) - Add to MetaCart
, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly

Privacy-Preserving Public Auditing for Secure Cloud Storage

by Cong Wang, Sherman S.-M. Chow, Qian Wang, Kui Ren, Wenjing Lou , 2009
"... Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession o ..."
Abstract - Cited by 75 (3 self) - Add to MetaCart
auditability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy

High Security by Using Single Cloud

by Bahaa Kareem , Mohammed Alatabe
"... ABSTRACT: Cloud computing is the delivery of computing and storage capacity as a service to a community of end-recipients. Cloud computing entrusts services with a user's data, software and computation over a network. Cloud storage enables users to remotely store their data and enjoy the on-de ..."
Abstract - Add to MetaCart
-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users, physical possession of their outsourced data, which unavoidably poses new security risks toward the correctness of the data in cloud

Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption

by Ming Li, Shucheng Yu, Yao Zheng, Student Member, Kui Ren, Senior Member, Wenjing Lou, Senior Member - IEEE Transactions on Parallel and Distributed Systems , 2012
"... Abstract—Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third p ..."
Abstract - Cited by 59 (2 self) - Add to MetaCart
and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability, and efficiency of our proposed scheme. Index Terms—Personal health records, cloud computing, data privacy, fine-grained access control, attribute

Towards Secure Communication for Highly Scalable Mobile Applications in Cloud Computing Systems

by Piotr K. Tysowski, M. Anwarul Hasan
"... Cloud computing is a distributed computing model in which clients pay for computing and data storage resources of a third-party cloud provider. Cloud applications can scale up or down almost instantly to meet real-time computational demands. Despite the economic advantages of a pay-on-demand busines ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
-on-demand business model, security remains a paramount concern. Cloud applications by nature must store and retain access to a potentially large volume of data. Yet, the consensus among IT organizations is that the cloud provider generally cannot be implicitly trusted, and thus this data should ideally

Secure and Dependable Cloud Services for TPA in Cloud Computing

by Eesh. B. B, Ganesh Kumar R, Jitendranath Mungara
"... Abstract: The cloud storage provides users to easily store their data and enjoy the good quality cloud applications need not install in local hardware and software system. So benefits are clear, such a service is also gives users ’ physical control of their outsourced data, which provides control ov ..."
Abstract - Add to MetaCart
over security problems towards the correctness of the storage data in the cloud. In order to do this new problem and further achieve a secure and dependable cloud storage services, we propose in this paper a flexible distributed storage integrity auditing mechanism, using the homomorphism token

Toward secure multikeyword top-k retrieval over encrypted cloud ata

by Jiadi Yu , Peng Lu , Yanmin Zhu , Guangtao Xue , Minglu Li - IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING , 2013
"... Abstract Cloud computing has emerging as a promising pattern for data outsourcing and highquality data services. However, concerns of sensitive information on cloud potentially causes privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency. ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
Abstract Cloud computing has emerging as a promising pattern for data outsourcing and highquality data services. However, concerns of sensitive information on cloud potentially causes privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency

Secure and Dependable Storage Services In Cloud Computing

by Ch. Venkata Lakshmi, Jammi Ashok
"... �Abstract- Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users ’physical possession of their outsourced ..."
Abstract - Add to MetaCart
localization, i.e., the Identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly

Public Auditing For Secure Cloud Storage with HLA

by M. Madhavi, O. Srinivasa Reddy, Dr. S. Sai Satyanarayana Reddy
"... Abstract- Cloud computing is internet based computing which enables sharing of services. Many users place their data in the cloud. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in cloud computing a ve ..."
Abstract - Add to MetaCart
in cloud is achieved by signing the data block before sending to the cloud. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free. To securely introduce an effective
Next 10 →
Results 1 - 10 of 56
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University