Find out the innovative techniques of data sharing using cryptography by systematic literature review

A Sen, R Ahmed, S Hossain, SH Tasnim… - Turkish Journal of …, 2023 - turcomat.org
Secure data sharing is crucial for protecting sensitive information, and the use of
cryptographic protocols, such as the Secure Shell (SSH) protocol, provides an efficient way …

Intrusion detection techniques based secured data sharing system for cloud computing using msvm

S Kannadhasan, R Nagarajan… - 2022 9th International …, 2022 - ieeexplore.ieee.org
Cloud storage has grown in popularity, attracting a lot of interest from academics and IT
professionals. In the digital era, cloud computing has grown increasingly vital for scalable …

[PDF][PDF] Enhanced security for data sharing in multi cloud storage (SDSMC)

K Subramanian, FL John - International Journal of …, 2017 - pdfs.semanticscholar.org
Multiple Cloud storage has become one of the essential services of cloud computing. This
Multi-Cloud storage models allow users to store sliced encrypted data in various cloud …

Studying Security of Data in Cloud Computing Through Cryptographic Approach

HF El-Sofany, SA El-Seoud - … Learning: Proceedings of the 19th ICL …, 2017 - Springer
Cloud computing is a set of IT services offered to users over the WWW on a rented base.
Cloud computing has many advantages such as flexibility, efficiency, scalability, integration …

[PDF][PDF] An approach to secure access to cloud storage service

J Shetty, MR Anala, G Shobha - International Journal of Research, 2015 - researchgate.net
Cloud computing is an agglomeration of technologies such as operating systems, network,
data storage and virtualization with inherent security issues such as data theft …

[PDF][PDF] Security Approach for Multi-Cloud Data Storage

M Kadam, S Chaudhary, B Carvalho - International Journal of …, 2015 - researchgate.net
In many organizations, transformation of information and storage of sensitive data has
highest priority. Client data should be kept secret as well as inaccessible from all other …

Analysis of encryption algorithm for data security in cloud computing

A Dutta, A Bhattacharyya, C Misra, SS Patra - … Computing Techniques and …, 2021 - Springer
Cloud computing offers various types of resources to its users. In recent years with the
development of Cloud Computing, there has been an increase in the use of storage service …

[PDF][PDF] Effective Secure Data Agreement Approach-based cloud storage for a healthcare organization

R Thatikonda, A Padthe, SA Vaddadi… - International Journal of …, 2023 - core.ac.uk
In recent days, there has been a significant development in the field of computers as they
need to handle the vast resource using cloud computing and performing various cloud …

[PDF][PDF] Secure distributed cloud storage based on the blockchain technology and smart contracts

S Gousteris, YC Stamatiou… - Emerging Science …, 2023 - pdfs.semanticscholar.org
Objectives: This paper addresses the problem of secure data storage and sharing over
cloud storage infrastructures. A secure, distributed cloud storage structure incorporating the …

SSeCloud: Using secret sharing scheme to secure keys

L Hu, Y Huang, D Yang, Y Zhang… - IOP Conference Series …, 2017 - iopscience.iop.org
With the use of cloud storage services, one of the concerns is how to protect sensitive data
securely and privately. While users enjoy the convenience of data storage provided by semi …