A secure user enforcedthe data access control and that mechanism must be provided before the cloud users have liberty to outsource delicatedata to cloud for storage. With the emergence of sharing personal data on cloud servers, it is essential to acquire...
and P.Afsar, " Cloud computing security using encryption technique," IJASCSE, 2013.Geetha Thomas, Prem Jose, P.Afsar."Cloud Computing Security using Encryption Techniques".Geethu Thomas, Prem Jose V, P.Afsar, "Cloud computing security using encryption technique", pp 1-7....
Joshi B, Joshi B, Mishra A, Arya V, Gupta AK, Peraković D (2022) A comparative study of privacy-preserving homomorphic encryption techniques in cloud computing. Int J Cloud Appl Comput (IJCAC) 12(1):1–11 (IGI Global) Google Scholar Kaur M, AlZubi AA, Singh D, Kumar V, Lee ...
Joshi B, Joshi B, Mishra A, Arya V, Gupta AK, Peraković D (2022) A comparative study of privacy-preserving homomorphic encryption techniques in cloud computing. Int J Cloud Appl Comput (IJCAC) 12(1):1–11. https://doi.org/10.4018/IJCAC.309936 Article Google Scholar Kalpana M, Rat...
Spideroak does not deduplicate across accounts while Wuala does (not sure about Bitcasa). But as “Alan Fairless” posted, doing so while preserving all security properties is not possible (with current techniques). If a cloud storage service can deduplicate a file I upload, it can also (and...
Today cloud security is become more challenging task to many researcher to give privacy and confidentiality on original data that to be shared among them. To give security to cloud data, the cloud service provide maintain the encryption techniques to secure the data. Apart from that the client ...
and division of personal health records users into multiple security domains which reduce key management intricacy for owners and users.To achieve fine-grained and scalable data access control for PHRs, we leverage Attribute Predicated Encryption (ABE) techniques to encrypt each patient's PHR file. ...
a hybrid approach to boosting the security of online applications, particularly within the realm of cloud computing. By merging two distinct techniques—homomorphic encryption and the squirrel search algorithm (SSA)—the study demonstrates a significant enhancement in the security of cloud computing ...
In the cloud environment, an adversary has the ability to intercept information and must be secured from eavesdroppers. Unluckily, encryption and decryption functions are slow and they are often hard. Fingerprint techniques required extra hardware and software; it is masqueraded by artificial gummy ...
To achieve fine grained and scalable data access control for medical records stored in semi trusted servers, we leverage attribute based encryption (ABE) techniques to encrypt each patients medical record file. In this paper, we describe a new approach which enables secure storage and controlled ...