Proceedings ArticleDOI
Data security frameworks in cloud
T. Devi,R Gane San +1 more
- pp 1-6
Reads0
Chats0
TLDR
A new hybrid model for data security in cloud targets encrypting data and ensures that the proper policies are enforced and speed of processing and computational efficiency of encrypted data should also be considered since the cloud environment involves large amount of data transfer, storage and usage.Abstract:
Cloud computing provides a wide range of services to consumers with lesser investment which are delivered over Internet Security is considered to be a significant problem in the development of cloud computing which is actually an obstacle to the growth of cloud is computing The most challenging task in a shared environment like cloud is data security Cloud enables the clients to store data on remote servers thereby preventing direct control over this data Data in cloud is not controlled by the data owner So, proper data security mechanism must be maintained A new hybrid model for data security in cloud targets encrypting data and ensures that the proper policies are enforced The major objective is to transmit, store and retrieve data in a secure manner The main focus of this paper is to highlight the various encryption techniques and data integrity proofs Speed of processing and computational efficiency of encrypting data should also be considered since the cloud environment involves large amount of data transfer, storage and usage This paper presents the survey about data security in cloud computingread more
Citations
More filters
Posted Content
PORs: Proofs of Retrievability for Large Files
Ari Juels,Burton S. Kaliski +1 more
TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Book
HESSIS: Hybrid Encryption Scheme for Secure Image Sharing in a Cloud Environment
Jaspreet Kaur,Sumit Sharma +1 more
TL;DR: A hybrid algorithm ‘HESSIS’ is proposed to secure data while sharing and Secure hashing algorithm-3, Elliptic Curve and Advanced encryption algorithm are combined to enhance the security.
Rehabilitation at Home of Patients with Neglect Using a Telemedical Intervention: a Security Perspective
TL;DR: The rehabilitation of stroke patients suffering from neglect is today a time and resource heavy process for therapists and patients.
Dissertation
Implementing Live Migration Security
TL;DR: This dissertation investigated two popular open source hypervisors XEN and KVM and found security flaws in each system and proposed securing the live migration process by using encryption, intrusion detection systems, role based access control and firewall rules.
References
More filters
Book
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance
TL;DR: This book, written by recognized authorities in the tech security world, addresses issues that affect any organization preparing to use cloud computing as an option and provides the detailed information on cloud computing security that has been lacking, until now.
Journal ArticleDOI
A survey on security issues and solutions at different layers of Cloud computing
TL;DR: The factors affecting Cloud computing adoption, vulnerabilities and attacks are surveyed, and relevant solution directives to strengthen security and privacy in the Cloud environment are identified.
Book ChapterDOI
Incremental Cryptography: The Case of Hashing and Signing
TL;DR: The idea is that having once applied the transformation to some document M, the time to update the result upon modification of M should be "proportional" to the "amount of modification" done to M.
Journal ArticleDOI
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
TL;DR: This paper proposes a secure multi-owner data sharing scheme, named Mona, for dynamic groups in the cloud, leveraging group signature and dynamic broadcast encryption techniques, so that any cloud user can anonymously share data with others.
Journal ArticleDOI
A combined approach to ensure data security in cloud computing
TL;DR: A frame work comprising of different techniques and specialized procedures is proposed that can efficiently protect the data from the beginning to the end, i.e., from the owner to the cloud and then to the user.