Towards mitigating uncertainty of data security breaches and collusion in cloud computing

A Tchernykh, M Babenko, N Chervyakov… - … on Database and …, 2017 - ieeexplore.ieee.org
… To reduce data redundancy, computational complexity of data … in the case of collusion, we
propose a cloud storage system … It provides a single method to ensure security, robustness, …

[PDF][PDF] Towards Mitigating Uncertainty of Data Security Breaches and Collusion in Cloud Computing

NC Federal - academia.edu
… To reduce data redundancy, computational complexity of data … in the case of collusion, we
propose a cloud storage system … It provides a single method to ensure security, robustness, …

Cloud Outsourcing Risk Management for Cloud Consumers: A Systematic Literature Review

MYM Haq, S Anand, A Abhishta… - ACM computing …, 2024 - research.utwente.nl
… consumers in understanding and mitigating both technical … on economic aspects of
information security. We consider this … expected loss 𝐿 of a security breach on an information set. …

[HTML][HTML] AC-RRNS: Anti-collusion secured data sharing scheme for cloud storage

A Tchernykh, M Babenko, N Chervyakov… - International Journal of …, 2018 - Elsevier
… To mitigate this type of uncertainty and reduce harms it can … provide data security in the
cloud environment that needs datauncertainty and minimize the risks of data security breaches

[HTML][HTML] The uncertain cloud: State of the art and research challenges

H Mezni, S Aridhi, A Hadjali - International Journal of Approximate …, 2018 - Elsevier
mitigate that impact in the uncertain cloud environment. … together with harms caused by cloud
collusion. To meet their goals, … future directions towards uncertainty-aware cloud computing

Scalable data storage design for nonstationary IoT environment with adaptive security and reliability

A Tchernykh, M Babenko, N Chervyakov… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
… , technical failures, and data security breaches are difficult to … IoT infrastructure capable of
mitigating their consequences. … cloud collusion when attackers want to get the original data

Experimental analysis of secret sharing schemes for cloud storage based on rns

V Miranda-López, A Tchernykh… - … Performance Computing …, 2017 - Springer
data security breaches, collusioncloud collusion under uncertain conditions. They use a
modified threshold Asmuth-Bloom and weighted Mignotte SSS to mitigate this type of uncertainty

Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage

A Tchernykh, V Miranda-López, M Babenko… - … Computing, 2019 - Springer
… We consider the best scenario when no error occurs and worst-case scenario, when error
Towards mitigating uncertainty of data security breaches and collusion in cloud computing. …

Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control

AAN Patwary, RK Naha, S Garg, SK Battula… - Electronics, 2021 - mdpi.com
… Ballot-stuffing attack (BSA): this attack is similar to the collusion … leads to an increase in the
scope of security breaches. In … of Fog security configurations auditing, we can mitigate these …

Bi-objective analysis of an adaptive secure data storage in a multi-cloud

EC Lopez-Falcon, V Miranda-López… - … Performance Computing …, 2018 - Springer
… of cloud collusion. In [17], an approach to address data security and privacy protection issues
is proposed. … characteristic, and study how adaptive strategies mitigate their uncertainty. …