• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 50
Next 10 →

Homomorphic Token and Distributed Erasure-Code for cloud

by B. Anjani Kumar, K. Hari Prasad, C. Subash Ch
"... ABSTRACT: Cloud users store their data in the cloud environment which is privileged by the service provider. Cloud users can access their cloud storage. Here we propose a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. Th ..."
Abstract - Add to MetaCart
ABSTRACT: Cloud users store their data in the cloud environment which is privileged by the service provider. Cloud users can access their cloud storage. Here we propose a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data

Graph Homomorphisms and Long Range Actions

by Graham R. Brightwell, Peter Winkler , 2001
"... We show that if a graph H is k-colorable, then (k−1)-branching walks on H exhibit long range action, in the sense that the position of a token at time 0 constrains the configuration of its descendents arbitrarily far into the future. This long range action property is one of several investigated her ..."
Abstract - Cited by 10 (0 self) - Add to MetaCart
We show that if a graph H is k-colorable, then (k−1)-branching walks on H exhibit long range action, in the sense that the position of a token at time 0 constrains the configuration of its descendents arbitrarily far into the future. This long range action property is one of several investigated

Controlled Homomorphic Encryption: Definition and Construction

by Yvo Desmedt , Vincenzo Iovino , Giuseppe Persiano , Ivan Visconti
"... Abstract. Fully Homomorphic Encryption schemes (FHEs) and Functional Encryption schemes (FunctEs) have a tremendous impact in cryptography both for the natural questions that they address and for the wide range of applications in which they have been (sometimes critically) used. In this work we put ..."
Abstract - Add to MetaCart
Abstract. Fully Homomorphic Encryption schemes (FHEs) and Functional Encryption schemes (FunctEs) have a tremendous impact in cryptography both for the natural questions that they address and for the wide range of applications in which they have been (sometimes critically) used. In this work we

Delegatable homomorphic encryption with applications to secure outsourcing of computation

by M. Barbosa, P. Farshim - In CT-RSA , 2012
"... Abstract. In this work we propose a new cryptographic primitive called Delegatable Homomorphic Encryption (DHE). This allows a Trusted Authority to control/delegate the capability to evaluate circuits over encrypted data to untrusted workers/evaluators by issuing tokens. This primitive can be both s ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
Abstract. In this work we propose a new cryptographic primitive called Delegatable Homomorphic Encryption (DHE). This allows a Trusted Authority to control/delegate the capability to evaluate circuits over encrypted data to untrusted workers/evaluators by issuing tokens. This primitive can be both

Ensuring data storage security in cloud computing

by Cong Wang, Qian Wang, Kui Ren, Wenjing Lou - in Proc. of IWQoS’09 , 2009
"... Abstract—Cloud Computing has been envisioned as the nextgeneration architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data cent ..."
Abstract - Cited by 84 (3 self) - Add to MetaCart
of service. To ensure the correctness of users ’ data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration

Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing

by Vasu Raju, Raj Kumar
"... The Cloud Computing is the next generation architecture of IT Enterprise. It moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. Here, focus is on cloud data storage security, an important aspect of quali ..."
Abstract - Add to MetaCart
of quality of service. To ensure the correctness of users ’ data in the cloud, we propose an effective and flexible distributed scheme with two salient features. By utilizing the homomorphic token with distributed verification of erasure-coded data, the scheme achieves the integration of storage correctness

Rateless Erasure Code Based Secure Storage in Cloud Computing

by unknown authors
"... Abstract-- Cloud computing is a promising computing model that enables convenient and on-demand network access to a shared pool of configurable computing resources. The first offered cloud service is moving data into the cloud: data owners let cloud service providers host their data on cloud servers ..."
Abstract - Add to MetaCart
in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of raptor coded data, our scheme achieves the integration of storage correctness insurance and data error localization

Developing Third Party Auditing Scheme for Secure Cloud Storage Service

by Manasi Doshi, Swapnaja Hiray
"... Cloud computing is the use of computing of sources that are delivered as a service over a network. Cloud enables users to store their data, but data is stored at remote location. A major characteristic of the cloud services is that user’s data are usually processed remotely in unknown machines that ..."
Abstract - Add to MetaCart
that users do not operate. So, basic need is to provide security to cloud server. To achieve this, perform flexible distributed storage, utilizing the homomorphism token and distributed erasurecoded data. Also allows for strong cloud storage correctness and simultaneously achieves fast data error

Secure and Dependable Storage in Cloud Computing

by unknown authors
"... Cloud computing as been developed by the next generation architecture of IT activity. This is an Internet-based development and use of computer technology. Cloud Computing moves the application software and databases to the large data centers, where the organization of the data and services may not ..."
Abstract - Add to MetaCart
of users data in the cloud. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the

Toward Secure and Dependable Storage Services in Cloud Computing

by Cong Wang, Qian Wang, Kui Ren, Ning Cao, Wenjing Lou , 2012
"... Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, whi ..."
Abstract - Cited by 40 (3 self) - Add to MetaCart
, which inevitably poses new security risks toward the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic
Next 10 →
Results 1 - 10 of 50
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University