scispace - formally typeset
Proceedings ArticleDOI

Data security frameworks in cloud

T. Devi, +1 more
- pp 1-6
Reads0
Chats0
TLDR
A new hybrid model for data security in cloud targets encrypting data and ensures that the proper policies are enforced and speed of processing and computational efficiency of encrypted data should also be considered since the cloud environment involves large amount of data transfer, storage and usage.
Abstract
Cloud computing provides a wide range of services to consumers with lesser investment which are delivered over Internet Security is considered to be a significant problem in the development of cloud computing which is actually an obstacle to the growth of cloud is computing The most challenging task in a shared environment like cloud is data security Cloud enables the clients to store data on remote servers thereby preventing direct control over this data Data in cloud is not controlled by the data owner So, proper data security mechanism must be maintained A new hybrid model for data security in cloud targets encrypting data and ensures that the proper policies are enforced The major objective is to transmit, store and retrieve data in a secure manner The main focus of this paper is to highlight the various encryption techniques and data integrity proofs Speed of processing and computational efficiency of encrypting data should also be considered since the cloud environment involves large amount of data transfer, storage and usage This paper presents the survey about data security in cloud computing

read more

Citations
More filters
Posted Content

PORs: Proofs of Retrievability for Large Files

TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Book

HESSIS: Hybrid Encryption Scheme for Secure Image Sharing in a Cloud Environment

TL;DR: A hybrid algorithm ‘HESSIS’ is proposed to secure data while sharing and Secure hashing algorithm-3, Elliptic Curve and Advanced encryption algorithm are combined to enhance the security.

Rehabilitation at Home of Patients with Neglect Using a Telemedical Intervention: a Security Perspective

Emil Palm
TL;DR: The rehabilitation of stroke patients suffering from neglect is today a time and resource heavy process for therapists and patients.
Dissertation

Implementing Live Migration Security

TL;DR: This dissertation investigated two popular open source hypervisors XEN and KVM and found security flaws in each system and proposed securing the live migration process by using encryption, intrusion detection systems, role based access control and firewall rules.
References
More filters
Book

Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance

TL;DR: This book, written by recognized authorities in the tech security world, addresses issues that affect any organization preparing to use cloud computing as an option and provides the detailed information on cloud computing security that has been lacking, until now.
Journal ArticleDOI

A survey on security issues and solutions at different layers of Cloud computing

TL;DR: The factors affecting Cloud computing adoption, vulnerabilities and attacks are surveyed, and relevant solution directives to strengthen security and privacy in the Cloud environment are identified.
Book ChapterDOI

Incremental Cryptography: The Case of Hashing and Signing

TL;DR: The idea is that having once applied the transformation to some document M, the time to update the result upon modification of M should be "proportional" to the "amount of modification" done to M.
Journal ArticleDOI

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

TL;DR: This paper proposes a secure multi-owner data sharing scheme, named Mona, for dynamic groups in the cloud, leveraging group signature and dynamic broadcast encryption techniques, so that any cloud user can anonymously share data with others.
Journal ArticleDOI

A combined approach to ensure data security in cloud computing

TL;DR: A frame work comprising of different techniques and specialized procedures is proposed that can efficiently protect the data from the beginning to the end, i.e., from the owner to the cloud and then to the user.