Secure and economical multi-cloud storage policy with NSGA-II-C

J Yang, H Zhu, T Liu - Applied Soft Computing, 2019 - Elsevier
Multi-cloud computing is an attractive technology for many reasons including user's data
security. This work offers a solution to the problem relative to Multi-Cloud Storage (MCS), ie …

[PDF][PDF] Data storage security and privacy in cloud computing: A comprehensive survey

BK Jeevitha, J Thriveni, KR Venugopal - International Journal of …, 2016 - core.ac.uk
Cloud Computing is a form of distributed computing wherein resources and application
platforms are distributed over the Internet through on demand and pay on utilization basis …

[PDF][PDF] Hybrid algorithm designed for handling remote integrity check mechanism over dynamic cloud environment

S Arora, S Dalal - International Journal of Engineering & Technology, 2018 - academia.edu
Cloud computing is the becoming the architecture information technology of next generation.
Cloud computing provides dynamic set of resources for different category of users. Remote …

[PDF][PDF] Novel Approach of Integrity Verification in Dynamic Cloud Environment

S Arora, S Dalal - International Journal of Computer Science and …, 2016 - academia.edu
Now a days, people are attracting towards the cloud computing technology due to large
capacity of data storage. With large amount of storage and usage security issues like data …

Heterogeneity Shifts the Storage-Computation Tradeoff in Secure Multi-Cloud Systems

J Chen, CW Sung, TH Chan - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper considers the design of heterogeneous multi-cloud systems for big data storage
and computing in the presence of cloud collusion and failures. A fundamental concept of …

On the impact of pollution attacks on coding-based distributed storage systems

R Gaeta - IEEE Transactions on Information Forensics and …, 2022 - ieeexplore.ieee.org
Coding-based distributed storage systems (DSS) are employed in many diverse
heterogeneous settings, eg, cloud storage data centers, peer-to-peer systems, wireless …

[图书][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach

B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …

Enhanced image based authentication with secure key exchange mechanism using ECC in cloud

AS Tomar, SK Shankar, M Sharma, A Bakshi - Security in Computing and …, 2016 - Springer
Cloud computing is the most emerging trend in computing. It provides numerous services
like IaaS, PaaS and AaaS. It is a form of pay-per-use based computing. Although it provides …

A comparative analysis of different intrusion detection techniques in cloud computing

A Bakshi, Sunanda - … International Conference, ICAICR 2018, Shimla, India …, 2019 - Springer
Nowadays, the foremost optimal choice of every IT organization is cloud computing. Cloud
computing technology is very flexible and scalable in nature. The prime concern in cloud …

Information-theoretic cryptography and perfect secrecy

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
In this chapter, we first introduce entropy and some basic concepts related to information
theory. We show how entropy has find its way from thermodynamics into information theory …