Development and evaluation of a holistic framework and maturity assessment tools for data governance in cloud computing environments

MS Al-Ruithe - 2018 - eprints.staffs.ac.uk
Cloud computing is an emerging technology that is changing the way that public sector
organisations consume Information and Communication Technology (ICT) in different …

Development of an Algorithmic Approach for Hiding Sensitive Data and Recovery of Data based on Fingerprint Identification for Secure Cloud Storage

T Lokhande, S Sonekar, A Wani - 2021 8th International …, 2021 - ieeexplore.ieee.org
Information Security is a unified piece of information technology that has emerged as vibrant
technology in the last two decades. To manage security, authentication assumes a …

[PDF][PDF] A Modified Cloud-Based Cryptographic Agent for Cloud Data Integrity.

B Hathout, S Ghoniemy, O Ibrahim - International Journal Of …, 2017 - academia.edu
In spite of all the advantages delivered by cloud computing, several challenges are
hindering the migration of customer software and data into the cloud. On top of the list is the …

[PDF][PDF] Third-Party based Data Auditing Service (TP-DAS)

M Alharby - University of Manchester. School of …, 2015 - studentnet.cs.manchester.ac.uk
Cloud computing has emerged as a means of providing various hosted services to the end
user. One of these services is the storage service that allows users to shift their data into the …

Signature based data auditing under mobile cloud system

R Shiny, RS Shaji, JP Jayan - 2015 Global Conference on …, 2015 - ieeexplore.ieee.org
Cloud computing is getting more popular in the field of computer science because of its
reliability in storing and assessing data remotely. In the presence scenario it is very biter to …

An efficient data integrity & data recovery with two TPAs in cloud data storage

S Patil, N Rai - … on Energy, Communication, Data Analytics and …, 2017 - ieeexplore.ieee.org
Cloud Computing has gained popularity in recent years. Cloud provides huge storage space
for various types of data and can provide unlimited computing resources on demand. These …

Design and Development of Collaborative Approach for Integrity Auditing and Data Recovery based on Fingerprint Identification for Secure Cloud Storage

A Wani, S Sonekar, T Lokhande - 2021 2nd Global Conference …, 2021 - ieeexplore.ieee.org
In a Leading field of Information Technology moreover make information Security a unified
piece of it. To manage security, Authentication assumes a significant part. Biometric is the …

DH-CRT: A Diffie Hellman with Chinese Remainder Theorem Based Cloud Data Sharing

S Santhi… - Journal of Computational …, 2018 - ingentaconnect.com
Providing security to the cloud data is a highly complicated and demanding task nowadays.
For this purpose, different existing works provide encryption and key generation based …

[PDF][PDF] DATA INTEGRITY CHECKING FOR SECURING CLOUD STORAGE USING MODIFIED BLOWFISH ALGORITHM.

G Sekar, A Sathya - International Journal of Advanced …, 2017 - pdfs.semanticscholar.org
Cloud computing, an emerging technology is being widely used for outsourcing the data into
the cloud instead of storing it in the local physical storage. It can be accessed by either …

[引用][C] A Lightweight Hybrid Key Management Scheme using Third Party Auditor for Data Security in Cloud

V Vasanthi, M Chidambaram