Results 1 - 10
of
50
Homomorphic Token and Distributed Erasure-Code for cloud
"... ABSTRACT: Cloud users store their data in the cloud environment which is privileged by the service provider. Cloud users can access their cloud storage. Here we propose a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. Th ..."
Abstract
- Add to MetaCart
ABSTRACT: Cloud users store their data in the cloud environment which is privileged by the service provider. Cloud users can access their cloud storage. Here we propose a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data
Graph Homomorphisms and Long Range Actions
, 2001
"... We show that if a graph H is k-colorable, then (k−1)-branching walks on H exhibit long range action, in the sense that the position of a token at time 0 constrains the configuration of its descendents arbitrarily far into the future. This long range action property is one of several investigated her ..."
Abstract
-
Cited by 10 (0 self)
- Add to MetaCart
We show that if a graph H is k-colorable, then (k−1)-branching walks on H exhibit long range action, in the sense that the position of a token at time 0 constrains the configuration of its descendents arbitrarily far into the future. This long range action property is one of several investigated
Controlled Homomorphic Encryption: Definition and Construction
"... Abstract. Fully Homomorphic Encryption schemes (FHEs) and Functional Encryption schemes (FunctEs) have a tremendous impact in cryptography both for the natural questions that they address and for the wide range of applications in which they have been (sometimes critically) used. In this work we put ..."
Abstract
- Add to MetaCart
Abstract. Fully Homomorphic Encryption schemes (FHEs) and Functional Encryption schemes (FunctEs) have a tremendous impact in cryptography both for the natural questions that they address and for the wide range of applications in which they have been (sometimes critically) used. In this work we
Delegatable homomorphic encryption with applications to secure outsourcing of computation
- In CT-RSA
, 2012
"... Abstract. In this work we propose a new cryptographic primitive called Delegatable Homomorphic Encryption (DHE). This allows a Trusted Authority to control/delegate the capability to evaluate circuits over encrypted data to untrusted workers/evaluators by issuing tokens. This primitive can be both s ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
Abstract. In this work we propose a new cryptographic primitive called Delegatable Homomorphic Encryption (DHE). This allows a Trusted Authority to control/delegate the capability to evaluate circuits over encrypted data to untrusted workers/evaluators by issuing tokens. This primitive can be both
Ensuring data storage security in cloud computing
- in Proc. of IWQoS’09
, 2009
"... Abstract—Cloud Computing has been envisioned as the nextgeneration architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data cent ..."
Abstract
-
Cited by 84 (3 self)
- Add to MetaCart
of service. To ensure the correctness of users ’ data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration
Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing
"... The Cloud Computing is the next generation architecture of IT Enterprise. It moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. Here, focus is on cloud data storage security, an important aspect of quali ..."
Abstract
- Add to MetaCart
of quality of service. To ensure the correctness of users ’ data in the cloud, we propose an effective and flexible distributed scheme with two salient features. By utilizing the homomorphic token with distributed verification of erasure-coded data, the scheme achieves the integration of storage correctness
Rateless Erasure Code Based Secure Storage in Cloud Computing
"... Abstract-- Cloud computing is a promising computing model that enables convenient and on-demand network access to a shared pool of configurable computing resources. The first offered cloud service is moving data into the cloud: data owners let cloud service providers host their data on cloud servers ..."
Abstract
- Add to MetaCart
in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of raptor coded data, our scheme achieves the integration of storage correctness insurance and data error localization
Developing Third Party Auditing Scheme for Secure Cloud Storage Service
"... Cloud computing is the use of computing of sources that are delivered as a service over a network. Cloud enables users to store their data, but data is stored at remote location. A major characteristic of the cloud services is that user’s data are usually processed remotely in unknown machines that ..."
Abstract
- Add to MetaCart
that users do not operate. So, basic need is to provide security to cloud server. To achieve this, perform flexible distributed storage, utilizing the homomorphism token and distributed erasurecoded data. Also allows for strong cloud storage correctness and simultaneously achieves fast data error
Secure and Dependable Storage in Cloud Computing
"... Cloud computing as been developed by the next generation architecture of IT activity. This is an Internet-based development and use of computer technology. Cloud Computing moves the application software and databases to the large data centers, where the organization of the data and services may not ..."
Abstract
- Add to MetaCart
of users data in the cloud. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the
Toward Secure and Dependable Storage Services in Cloud Computing
, 2012
"... Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, whi ..."
Abstract
-
Cited by 40 (3 self)
- Add to MetaCart
, which inevitably poses new security risks toward the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic
Results 1 - 10
of
50