A survey on security issues and solutions at different layers of Cloud computing

C Modi, D Patel, B Borisaniya, A Patel… - The journal of …, 2013 - Springer
Cloud computing offers scalable on-demand services to consumers with greater flexibility
and lesser infrastructure investment. Since Cloud services are delivered using classical …

[PDF][PDF] 面向云存储的高效动态密文访问控制方法

洪澄, 张敏, 冯登国 - 2011 - infocomm-journal.com
针对云存储中敏感数据的机密性保护问题, 在基于属性的加密基础上提出了一种密文访问控制
方法HCRE. 其思想是设计一种基于秘密共享方案的算法, 将访问控制策略变更导致的重加密 …

云基础设施安全性研究综述

黄瑛, 石文昌 - 计算机科学, 2011 - cqvip.com
云计算是当今全球关注的热点, 有可能引起信息技术新的变革, 但同时也带来了新的安全问题.
从云计算环境最基础的层次入手, 对云基础设施的安全性进行研究, 考察云基础设施安全性的 …

[PDF][PDF] 移动云服务的数据安全与隐私保护综述

李瑞轩, 董新华, 辜希武, 周湾湾, 王聪 - 通信学报, 2013 - infocomm-journal.com
移动云服务相比传统云具有移动互联, 灵活终端应用和便捷数据存取等特点. 然而,
丰富的移动云服务应用也带来了更多的安全与隐私泄露问题. 在阐述移动云服务的基本概念 …

A survey on cloud computing security

R Kanday - 2012 International Conference on Computing …, 2012 - ieeexplore.ieee.org
Cloud computing is a technology that uses the internet and central remote servers to
maintain data and applications. Cloud computing allows consumers and businesses to use …

An efficient and secure approach for a cloud collaborative editing

SC Yeh, MY Su, HH Chen, CY Lin - Journal of Network and Computer …, 2013 - Elsevier
The demand for cloud-based collaborative editing service is rising along with the
tremendously increased popularity in cloud computing. In the cloud-based collaborative …

Cloud Compliance Framework using Python

RR Thumati, LAJ Prabhu… - … Conference on Disruptive …, 2023 - ieeexplore.ieee.org
In today's Cloud environment there are number of issues related to cloud services such as
data security, managing of resources. In this paper we are handling these issues by creating …

ACaaS: Access control as a service for IaaS cloud

R Wu, X Zhang, GJ Ahn, H Sharifi… - … conference on social …, 2013 - ieeexplore.ieee.org
Organizations and enterprises have been outsourcing their computation, storage, and
workflows to Infrastructure-as-a-Service (IaaS) based cloud platforms. The heterogeneity …

[PDF][PDF] Merkle Tree-based Access Structure for Sensitive Attributes in Patient-Centric Data

BR Reddy, T Adilakshmi - International Journal of Engineering …, 2022 - researchgate.net
Wearable health care [1] is a prominent technology that allows people to get medical
services. Medical data obtained by wearables necessitates immediate and accurate …

基于敏感等级的云租户数据安全保护模型研究

江颉, 顾祝燕, 高俊骁, 陈铁明 - 系统工程理论与实践, 2014 - cqvip.com
为云计算提供有效的租户数据安全保护, 提出一个第三方租户数据安全保护模型,
解决租户数据的存储和检索安全问题. 模型采用隐藏数据间关系的方法, 对租户数据进行切片 …