• Nenhum resultado encontrado

[PDF] Top 20 A Survey on Cloud Storage Systems and Encryption Schemes

Has 10000 "A Survey on Cloud Storage Systems and Encryption Schemes" found on our website. Below are the top 20 most common "A Survey on Cloud Storage Systems and Encryption Schemes".

A Survey on Cloud Storage Systems and Encryption Schemes

A Survey on Cloud Storage Systems and Encryption Schemes

... cipher-texts and private ...attackers and a hierarchy. Hierarchy acts as a mediator and decrypts the data for the third party or gives the private decryption key to the third ...data and ... See full document

5

Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space

Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space

... depend on various fundamental security ...empower encryption whereas permitting deduplication on regular ...Joined encryption utilizes an element of the plain text a lump as the ... See full document

13

Security in Cloud Computing For Service Delivery Models: Challenges and Solutions

Security in Cloud Computing For Service Delivery Models: Challenges and Solutions

... of cloud computing is dynamic area of ...a survey on the security risks, security mechanisms and limitations of two platforms: Java and ...Operating Systems classical security ... See full document

10

A survey on top security threats in cloud computing

A survey on top security threats in cloud computing

... in cloud storage. CloudProof [8] is a system that can be built on top of existing cloud storages like Amazon S3 and Azure blob to ensure data integrity and confidentiality using ... See full document

5

Bernardo Luís da Silva Ferreira

Bernardo Luís da Silva Ferreira

... a cloud-of-clouds architecture, with email mes- sages replicated on diverse untrusted storage clouds that can fail or may be at- tacked ...2000) and secret-sharing techniques (Ilker Nadi ... See full document

203

Practical Isolated Searchable Encryption in a Trusted Computing Environment

Practical Isolated Searchable Encryption in a Trusted Computing Environment

... property-preserving encryption is usually practical and relies on widely- known algorithms, allowing for some computations over encrypted data, like equality (deterministic schemes) or ... See full document

144

On the Feasibility of (Practical) Commercial Anonymous Cloud Storage

On the Feasibility of (Practical) Commercial Anonymous Cloud Storage

... E-Cash systems [24], users can withdraw a number of electronic coins from a bank using a withdrawal protocol and then spend (pay) these coins at ...cash on their bank account using a deposit protocol ... See full document

23

A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection Process: World Future Society

A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection Process: World Future Society

... ABSTRACT----------------------------------------------------------- Cloud computing is an emerging technology which could replace long-established IT ...systems. Cloud computing made big strides ... See full document

6

A Study on Multi-Attribute Database Indexing on Cloud System

A Study on Multi-Attribute Database Indexing on Cloud System

... scalability and reliability therefore it cannot be directly applied to the new ...services on the Cloud must support large-scale data analytical tasks and high concurrent On-Line ... See full document

6

 Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

... - Cloud computing techniques are used to share ...software and databases to the centralized large data ...with cloud storage providers comes with serious security ...The cloud can leak ... See full document

5

Privacy-Enhanced Dependable and Searchable Storage in a Cloud-of-Clouds

Privacy-Enhanced Dependable and Searchable Storage in a Cloud-of-Clouds

... the cloud and the several problems that arise from doing so is an area of active ...several systems follow a related approach to the one taken on this thesis, they can be improved upon, ... See full document

112

Study of secure m-commerce, challenges and solutions

Study of secure m-commerce, challenges and solutions

... based on WPKI with Bluetooth ...names and PINS or passphrases When a PIN and passphrases identifies individuals, which could possibly vary from service to ...burden on users who have multiple ... See full document

9

An Efficient Encryption Algorithm for P2P Networks Robust Against Man-in-the-Middle Adversary

An Efficient Encryption Algorithm for P2P Networks Robust Against Man-in-the-Middle Adversary

... exchange and are being used in many applications such as file sharing, distributed computing, video conference, VoIP, radio and TV ...implications and vulnerabilities that need to be ... See full document

6

DESIGN AND IMPLEMENTATION OF A PRIVACY PRESERVED OFF-PREMISES CLOUD STORAGE

DESIGN AND IMPLEMENTATION OF A PRIVACY PRESERVED OFF-PREMISES CLOUD STORAGE

... cost-effective and flexible characteristics of cloud computing, some clients are reluctant to adopt this paradigm due to emerging security and privacy ...Healthcare and Payment Card Industry ... See full document

14

Braz. J. Pharm. Sci.  vol.51 número1

Braz. J. Pharm. Sci. vol.51 número1

... oil and small amount of ...microemulsion systems under investigation used short-chain alcohol, such as ethanol, as the co-surfactant (Yuan et ...glycerol, and formamide. These solvents, like water, ... See full document

10

Performance of McRAS-AC in the GEOS-5 AGCM: aerosol-cloud-microphysics, precipitation, cloud radiative effects, and circulation

Performance of McRAS-AC in the GEOS-5 AGCM: aerosol-cloud-microphysics, precipitation, cloud radiative effects, and circulation

... for model’s biases but each dataset has its own uncertainties. One naturally likes to find out, where McRAS-AC really made a difference vis- `a-vis the baseline AGCM and whether it is statistically significant ... See full document

54

Cloud Data Storage for Group Collaborations

Cloud Data Storage for Group Collaborations

... data and application software from traditional local hosts to network servers, cloud computing provides more flexible and convenient access to data and services, with cheaper software ... See full document

2

Assessment Of Some Acceleration Schemes In The Solution Of Systems Of Linear Equations.

Assessment Of Some Acceleration Schemes In The Solution Of Systems Of Linear Equations.

... linear systems of equations in a parallel environment, since, unlike methods based on orthogonalization (such as Conjugate Gradient) it does not require computing computation-intensive inner products for ... See full document

8

PRIVACY IN CLOUD COMPUTING: A SURVEY

PRIVACY IN CLOUD COMPUTING: A SURVEY

... searches and seizures of his stored email using the federal Stored Communications Act (SCA) in July, ...focuses on the issues related to Privacy in cloud ...disclosure, storage and ... See full document

10

Approaching universal frequency reuse through base station cooperation

Approaching universal frequency reuse through base station cooperation

... distortion and to ensure an adequate performance, as well as to remove the effects of the ISI ...complexity and power consumption must be kept relatively low, especially at the MTs, since low-cost ... See full document

144

Show all 10000 documents...