Results 1 - 10
of
56
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
- In INFOCOM
, 2010
"... Abstract. Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relie ..."
Abstract
-
Cited by 135 (1 self)
- Add to MetaCart
Abstract. Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can
Toward Secure and Dependable Storage Services in Cloud Computing
, 2012
"... Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, whi ..."
Abstract
-
Cited by 40 (3 self)
- Add to MetaCart
, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly
Privacy-Preserving Public Auditing for Secure Cloud Storage
, 2009
"... Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession o ..."
Abstract
-
Cited by 75 (3 self)
- Add to MetaCart
auditability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy
High Security by Using Single Cloud
"... ABSTRACT: Cloud computing is the delivery of computing and storage capacity as a service to a community of end-recipients. Cloud computing entrusts services with a user's data, software and computation over a network. Cloud storage enables users to remotely store their data and enjoy the on-de ..."
Abstract
- Add to MetaCart
-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users, physical possession of their outsourced data, which unavoidably poses new security risks toward the correctness of the data in cloud
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
- IEEE Transactions on Parallel and Distributed Systems
, 2012
"... Abstract—Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third p ..."
Abstract
-
Cited by 59 (2 self)
- Add to MetaCart
and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability, and efficiency of our proposed scheme. Index Terms—Personal health records, cloud computing, data privacy, fine-grained access control, attribute
Towards Secure Communication for Highly Scalable Mobile Applications in Cloud Computing Systems
"... Cloud computing is a distributed computing model in which clients pay for computing and data storage resources of a third-party cloud provider. Cloud applications can scale up or down almost instantly to meet real-time computational demands. Despite the economic advantages of a pay-on-demand busines ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
-on-demand business model, security remains a paramount concern. Cloud applications by nature must store and retain access to a potentially large volume of data. Yet, the consensus among IT organizations is that the cloud provider generally cannot be implicitly trusted, and thus this data should ideally
Secure and Dependable Cloud Services for TPA in Cloud Computing
"... Abstract: The cloud storage provides users to easily store their data and enjoy the good quality cloud applications need not install in local hardware and software system. So benefits are clear, such a service is also gives users ’ physical control of their outsourced data, which provides control ov ..."
Abstract
- Add to MetaCart
over security problems towards the correctness of the storage data in the cloud. In order to do this new problem and further achieve a secure and dependable cloud storage services, we propose in this paper a flexible distributed storage integrity auditing mechanism, using the homomorphism token
Toward secure multikeyword top-k retrieval over encrypted cloud ata
- IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
, 2013
"... Abstract Cloud computing has emerging as a promising pattern for data outsourcing and highquality data services. However, concerns of sensitive information on cloud potentially causes privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency. ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
Abstract Cloud computing has emerging as a promising pattern for data outsourcing and highquality data services. However, concerns of sensitive information on cloud potentially causes privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency
Secure and Dependable Storage Services In Cloud Computing
"... �Abstract- Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users ’physical possession of their outsourced ..."
Abstract
- Add to MetaCart
localization, i.e., the Identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly
Public Auditing For Secure Cloud Storage with HLA
"... Abstract- Cloud computing is internet based computing which enables sharing of services. Many users place their data in the cloud. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in cloud computing a ve ..."
Abstract
- Add to MetaCart
in cloud is achieved by signing the data block before sending to the cloud. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free. To securely introduce an effective
Results 1 - 10
of
56