A comprehensive overview of privacy and data security for cloud storage

N Akhtar, B Kerim, Y Perwej, A Tiwari… - International Journal of …, 2021 - hal.science
People used to carry their documents about on CDs only a few years ago. Many people
have recently turned to memory sticks. Cloud computing, in this case, refers to the capacity …

Privacy protection and data security in cloud computing: a survey, challenges, and solutions

PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …

Attribute-based encryption with outsourced decryption in blockchain

H Zheng, J Shao, G Wei - Peer-to-peer networking and applications, 2020 - Springer
Attribute-based encryption (ABE) is a powerful cryptographic primitive for access control and
fine-grained sharing on encrypted data. Due to this functionality, ABE is usually adopted in …

Secure fine grained access control for telecare medical communication system

AK Pandit, K Chatterjee, A Singh - Telecommunication Systems, 2023 - Springer
Modern healthcare institutions are now equipped to provide telecare services because of
substantial improvements in telecommunication. Numerous services are provided through …

Attribute-based encryption with publicly verifiable outsourced decryption

H Zheng, J Shao, G Wei, L Hu, B Pan, K Liu… - Network and System …, 2019 - Springer
Attribute-based encryption (ABE) is a useful cryptographic primitive for access control and
fine-grained sharing on encrypted data. However, the main drawback of ABE is that the …

High performance i/o

A Jackson, F Reid, J Hein, A Soba… - 2011 19th International …, 2011 - ieeexplore.ieee.org
Parallelisation, serial optimisation, compiler tuning, and many more techniques are used to
optimise and improve the performance scaling of parallel programs. One area which is …

An enhanced approach for data sharing security in cloud computing

I Ennajjar, Y Tabii… - International Journal of …, 2016 - inderscienceonline.com
One of the tremendous services that cloud computing offers is the data sharing and the data
storage. Customers can outsource data in cloud without having to worry about the capacity …

A Revocable Attribute-based Cloud Security for Data Access using Encryption and Biometric Identification.

MS Nejad, MV Malakooti, NH Taba - International Journal of Digital …, 2019 - go.gale.com
Cloud computing is an emerging technology in which it has been used to provide an efficient
solution for the affordable, trustable, and fastest storage and retrieval of the information. The …

Access control model with enhanced flexibility and scalability for cloud

RK Aluvalu, L Muddana - … on Green Computing and Internet of …, 2015 - ieeexplore.ieee.org
Cloud computing is an Internet based distributed computing model. It is a utility computing
model and achieved coherence by sharing resources on demand. All the Data stored on …

Encryption Based Access Control Model In Cloud: A Survey

R Chavda, R Aluvalu - Journal of Telematics and Informatics, 2015 - section.iaesonline.com
Cloud computing is known as “Utility”. Cloud Computing enabling users to remotely store
their data in a server and provide services on-demand. Since this new computing …