scispace - formally typeset
Proceedings ArticleDOI

Data security frameworks in cloud

T. Devi, +1 more
- pp 1-6
Reads0
Chats0
TLDR
A new hybrid model for data security in cloud targets encrypting data and ensures that the proper policies are enforced and speed of processing and computational efficiency of encrypted data should also be considered since the cloud environment involves large amount of data transfer, storage and usage.
Abstract
Cloud computing provides a wide range of services to consumers with lesser investment which are delivered over Internet Security is considered to be a significant problem in the development of cloud computing which is actually an obstacle to the growth of cloud is computing The most challenging task in a shared environment like cloud is data security Cloud enables the clients to store data on remote servers thereby preventing direct control over this data Data in cloud is not controlled by the data owner So, proper data security mechanism must be maintained A new hybrid model for data security in cloud targets encrypting data and ensures that the proper policies are enforced The major objective is to transmit, store and retrieve data in a secure manner The main focus of this paper is to highlight the various encryption techniques and data integrity proofs Speed of processing and computational efficiency of encrypting data should also be considered since the cloud environment involves large amount of data transfer, storage and usage This paper presents the survey about data security in cloud computing

read more

Citations
More filters
Posted Content

PORs: Proofs of Retrievability for Large Files

TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Book

HESSIS: Hybrid Encryption Scheme for Secure Image Sharing in a Cloud Environment

TL;DR: A hybrid algorithm ‘HESSIS’ is proposed to secure data while sharing and Secure hashing algorithm-3, Elliptic Curve and Advanced encryption algorithm are combined to enhance the security.

Rehabilitation at Home of Patients with Neglect Using a Telemedical Intervention: a Security Perspective

Emil Palm
TL;DR: The rehabilitation of stroke patients suffering from neglect is today a time and resource heavy process for therapists and patients.
Dissertation

Implementing Live Migration Security

TL;DR: This dissertation investigated two popular open source hypervisors XEN and KVM and found security flaws in each system and proposed securing the live migration process by using encryption, intrusion detection systems, role based access control and firewall rules.
References
More filters
Proceedings ArticleDOI

Pors: proofs of retrievability for large files

TL;DR: In this article, the authors define and explore proofs of retrievability (PORs), which are a kind of cryptographic proof of knowledge (POK) that enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Journal ArticleDOI

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing

TL;DR: To achieve efficient data dynamics, the existing proof of storage models are improved by manipulating the classic Merkle Hash Tree construction for block tag authentication, and an elegant verification scheme is constructed for the seamless integration of these two salient features in the protocol design.
Book ChapterDOI

Cryptographic cloud storage

TL;DR: This work considers the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer and describes several architectures that combine recent and non-standard cryptographic primitives to achieve this goal.
Proceedings ArticleDOI

Dynamic provable data possession

TL;DR: In this article, the authors present a definitional framework and efficient constructions for dynamic provable data possession (DPDP), which extends the PDP model to support provable updates to stored data.
Proceedings ArticleDOI

HAIL: a high-availability and integrity layer for cloud storage

TL;DR: The HighAvailability and Integrity Layer (HAIL) as discussed by the authors is a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and retrievable.