[HTML][HTML] Privacy preservation models for third-party auditor over cloud computing: A survey

A Razaque, MBH Frej, B Alotaibi, M Alotaibi - Electronics, 2021 - mdpi.com
Cloud computing has become a prominent technology due to its important utility service; this
service concentrates on outsourcing data to organizations and individual consumers. Cloud …

[HTML][HTML] Privacy preserving model: a new scheme for auditing cloud stakeholders

A Razaque, SS Rizvi - Journal of Cloud Computing, 2017 - Springer
The Cloud computing paradigm provides numerous attractive services to customers such as
the provision of the on-demand self-service, usage-based pricing, ubiquitous network …

Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment

A Razaque, SS Rizvi - Computers & Security, 2016 - Elsevier
Cloud computing is a relatively new paradigm that provides numerous advantages to
service providers, developers, and customers with respect to flexibility, scalability, and …

Securing the confidentiality and integrity of cloud computing data

B Hazela, SK Gupta, N Soni, CN Saranya - ECS Transactions, 2022 - iopscience.iop.org
Cloud Service Providers (CSPs) are becoming increasingly popular as the amount of
available digital data continues to grow at an exponential rate. A new set of benefits and …

Cloud data auditing techniques with a focus on privacy and security

M Kolhar, MM Abu-Alhaj… - IEEE Security & …, 2017 - ieeexplore.ieee.org
Nowadays, large amounts of data are stored with cloud service providers. Third-party
auditors (TPAs), with the help of cryptography, are often used to verify this data. However …

TPA auditing to enhance the privacy and security in cloud systems

S Kumar, D Kumar… - Journal of Cyber …, 2021 - journals.riverpublishers.com
Over the last decade, many enterprises around the world migrating from traditional
infrastructure to cloud resources in order to cut down operational and capital expenditure …

Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor

K Huang, M Xian, S Fu, J Liu - IET Communications, 2014 - Wiley Online Library
Cloud computing has been envisioned as the next generation architecture of the IT
enterprise, but there exist many security problems. A significant problem encountered in the …

SecSVA: secure storage, verification, and auditing of big data in the cloud environment

GS Aujla, R Chaudhary, N Kumar… - IEEE …, 2018 - ieeexplore.ieee.org
With the widespread popularity of Internet-enabled devices, there is an exponential increase
in the information sharing among different geographically located smart devices. These …

Privacy-preserving public auditing for secure cloud storage

C Wang, SSM Chow, Q Wang, K Ren… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
Using cloud storage, users can remotely store their data and enjoy the on-demand high-
quality applications and services from a shared pool of configurable computing resources …

[PDF][PDF] Efficient integrity checking technique for securing client data in cloud computing

D Attas, O Batrafi - IJECS, 2011 - Citeseer
It has been widely observed that the concept of cloud computing is become one of major
theory in the world of IT industry. It involves storing the user's data to be able to use the …