N
Neenu Garg
Researcher at Thapar University
Publications - 6
Citations - 134
Neenu Garg is an academic researcher from Thapar University. The author has contributed to research in topics: Data integrity & Cloud computing. The author has an hindex of 3, co-authored 4 publications receiving 67 citations.
Papers
More filters
Journal ArticleDOI
An efficient data integrity auditing protocol for cloud computing
TL;DR: An efficient approach for data integrity auditing in cloud computing is proposed and the results obtained have been compared with state-of-the-art protocols and demonstrates the high efficiency and adaptability of proposed protocol by clients with limited resources.
Journal ArticleDOI
Rits-mht
Neenu Garg,Seema Bawa +1 more
TL;DR: An approach based on Relative Index and Time Stamped Merkle Hash Tree (RITSMHT) which integrates MHT with relative index of a node resulting in reduction of computation cost of searching a data block from O(n) in Wang's protocol to O(log n) and time of last modification to data, thereby guarantying freshness of data respectively.
Journal ArticleDOI
Comparative analysis of cloud data integrity auditing protocols
Neenu Garg,Seema Bawa +1 more
TL;DR: A comparative analysis of existing data integrity auditing protocols chronologically first, based on development methods, and a specific analysis based on security methods, storage overheads, computation cost and communication cost are presented.
Proceedings ArticleDOI
ID-PAPC: Identity based Public Auditing Protocol for Cloud Computing
Neenu Garg,Seema Bawa +1 more
TL;DR: The features of Identity Based Signatures (IBS) are combined with public verification of data to construct an efficient protocol for DIA in cloud storage and security model for proposed ID-PAPC has been established in a ROM.
Peer Review
Formation of cyber security skills through methods of hacking, bypassing and protecting the procedure for granting access in microsoft windows operating system
Ahmad Ghafarian,Anatoliy Gorbenko,Alexander Romanovsky,Olena Stepanivna Tarasyuk,Oleksandr Biloborodov,Yugansh Khera,D. Ashok Kumar,Neenu Garg,Yaswanth Kolli,Takiah Mohd,Ahmad Y. Javaid,Andy Luse,A. A. M. J. Burkman,Rupesh Mahajan,Sumit Miglani,Sagar Samtani,H. Zhu,H. Chen,S. Shrivastava,Telugu Kuppu Shetty Ramesh,Deris Stiawan,Mohammad Yazid Bin Idris,Abu Hasnat Abdullah,Rahmat Budiarto,Hai-yan Xiao,Bang Zhao,Avery Walters,William Sadera +27 more
TL;DR: The authors describe typical modern tools of hacking, bypassing and protecting the procedure for granting access in Microsoft Windows operating systems (versions 7, 10), which will enable everyone to master some practical steps in order to realize the importance and necessity of key tools and techniques of ensuring personal cyber security.