Privacy preserving approaches in cloud computing

K Karthiban, S Smys - … on Inventive Systems and Control (ICISC …, 2018 - ieeexplore.ieee.org
Cloud computing is becoming a well-known catchphrase in recent times. It is continuously
evolving and showing consistent growth in the field of computing. It is applied in several …

A secure remote data integrity checking cloud storage system from threshold encryption

C Yao, L Xu, X Huang, JK Liu - Journal of Ambient Intelligence and …, 2014 - Springer
The confidentiality and integrity are the most important issues in cloud storage system. We
address the privacy issue of decentralized cloud storage system using threshold …

[PDF][PDF] Survey on privacy-preserving methods for storage in cloud computing

NM Joseph, E Daniel, NA Vasanthi - Amrita International Conference of …, 2013 - Citeseer
At present the mankind are progressively relying more on a number of online storage stores
to back up our data or for using it in real time which gives an anywhere, anytime access. All …

Cloud security audit for migration and continuous monitoring

UM Ismail, S Islam, H Mouratidis - 2015 IEEE Trustcom …, 2015 - ieeexplore.ieee.org
Security assurance in cloud computing is one of the main barriers for wider cloud adoption.
Potential cloud computing consumers like to know whether the controls in cloud …

Batch public auditing for distributed mobile cloud computing

C Yao, L Xu, X Huang - International Journal of High …, 2015 - inderscienceonline.com
Mobile cloud computing (MCC) has been envisioned as the major service participants
nowadays. In addition to the classic security and privacy concerns, outsourcing data in MCC …

[PDF][PDF] A survey on privacy preserving techniques for secure cloud storage

S Bhagyashri, YB Gurave - … Journal of Computer Science and Mobile …, 2014 - academia.edu
Cloud computing is the technology which enables obtaining resources like so services,
software, hardware over the internet. With cloud storage users can store their data remotely …

[PDF][PDF] A metadata verification scheme for data auditing in cloud environment

M Ramane, B Elangovan - International Journal on Cloud Computing …, 2012 - idc-online.com
Cloud, being the most vulnerable next generation architecture consists of two major design
elements ie the cloud service provider and the client. The architecture shifts data …

[PDF][PDF] Third-Party based Data Auditing Service (TP-DAS)

M Alharby - University of Manchester. School of …, 2015 - studentnet.cs.manchester.ac.uk
Cloud computing has emerged as a means of providing various hosted services to the end
user. One of these services is the storage service that allows users to shift their data into the …

[PDF][PDF] LITERATURE REVIEW ON PRIVACY PRESERVATION OF DATA IN THE CLOUD USING IOMT

S Addu, A Jain - romanpub.com
Every day, vast amounts of data are collected and analyzed in our information-driven world.
Cloud computing has emerged as the most popular model for supporting large and complex …

The effects of data locality on FDDI-based schemes at gigabit speeds

B Albert, AP Jayasumana - … of LCN-21st Annual Conference on …, 1996 - ieeexplore.ieee.org
This paper explores the effects of locality on the performance of a FDDI-based
multinetworking environment and compares this to a scaled FDDI approach. Both of these …