Ensuring distributed accountability for data sharing in the cloud

S Sundareswaran, A Squicciarini… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Cloud computing enables highly scalable services to be easily consumed over the Internet
on an as-needed basis. A major feature of the cloud services is that users' data are usually …

[PDF][PDF] Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing.

Z Yang, Y Huang, X Li, W Wang - Computers, Materials & …, 2018 - cdn.techscience.cn
To cope with privacy leakage caused by multimedia outsourcing and sharing, data
provenance is used to analyze leaked multimedia and provide reactive accountability …

CBFF: A cloud–blockchain fusion framework ensuring data accountability for multi-cloud environments

Q Li, Z Yang, X Qin, D Tao, H Pan, Y Huang - Journal of Systems …, 2022 - Elsevier
In order to develop emerging industries such as smart healthcare and intelligent
transportation, the government has established various organizations and platforms to …

Privacy‐preserving public auditing scheme for data confidentiality and accountability in cloud storage

Z Yang, W Wang, Y Huang, X Li - Chinese Journal of …, 2019 - Wiley Online Library
Cloud data confidentiality need to be audited for the data owner's concern. Confidentiality
auditing is usually based on logging schemes, whereas cloud data dynamics and sharing …

Reflecting on whether checklists can tick the box for cloud security

B Duncan, M Whittington - 2014 IEEE 6th International …, 2014 - ieeexplore.ieee.org
All Cloud computing standards are dependent upon checklist methodology to implement
and then audit the alignment of a company or an operation with the standards that have …

Protecting personal sensitive data security in the cloud with blockchain

Z Yang, Y Chen, Y Huang, X Li - Advances in Computers, 2021 - Elsevier
To protect personal sensitive data in cloud computing environment, certain issues need to
be addressed, including data ownership, fine-grained access control, transparency and …

Trust management approach for secure and privacy data access in cloud computing

K Mythili, H Anandakumar - 2013 international conference on …, 2013 - ieeexplore.ieee.org
Cloud computing enables the use of Internet services as-needed basis. An important issue
in the cloud is assuring privacy for the data stored in the cloud. There is a great challenge in …

A tiered strategy for auditing in the cloud

R Xie, R Gamble - 2012 IEEE Fifth International Conference on …, 2012 - ieeexplore.ieee.org
In this paper, we outline a tiered approach to auditing information in the cloud. The approach
provides perspectives on auditable events that may include compositions of independently …

How to govern the cloud? Characterizing the optimal enforcement institution that supports accountability in cloud computing

J Prüfer - 2013 IEEE 5th International Conference on Cloud …, 2013 - ieeexplore.ieee.org
This paper applies economic governance theory to the cloud computing industry. We
analyze which governance institution may be best suited to solve the problems stemming …

[PDF][PDF] CIA Triad for Achieving Accountability in Cloud Computing Environment

S Mohanty, M Ganguly, PK Pattnaik - International Journal of …, 2018 - academia.edu
Abstract Cloud Computing Environment fulfils the computational requirements of individual,
small organizations and large organizations with minimum cost. Generally, the data are the …