Blockchain-based integrity auditing for shared data in cloud storage with file prediction

Z Liu, S Wang, Y Liu - Computer Networks, 2023 - Elsevier
With the increasing publicity of information, more and more users are willing to share their
data with others. Therefore, in cloud storage services, the security of shared data has begun …

[PDF][PDF] Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.

SS Pericherla - ISC Int. J. Inf. Secur., 2023 - researchgate.net
Cloud computing created a revolution in the way IT organizations and IT teams manage their
internal digital resources and workloads. One major drawback or limitation of cloud …

Digital Evidence Data Collection: Cloud Challenges

S Syed, V Anu - 2021 IEEE International Conference on Big …, 2021 - ieeexplore.ieee.org
Cloud computing has become ubiquitous in the modern world and has offered a number of
promising and transformative technological opportunities. However, organizations that use …

Dynamic Data Integrity Auditing Based on Hierarchical Merkle Hash Tree in Cloud Storage

Z Liu, S Wang, S Duan, L Ren, J Wei - Electronics, 2023 - mdpi.com
In cloud storage mode, users lose physical control over their data. To enhance the security
of outsourced data, it is vital to audit the data integrity of the data owners. However, most of …

Securing Cloud Computing Environments: An Analysis of Multi-Tenancy Vulnerabilities and Countermeasures

W Hashim, NAHK Hussein - SHIFRA, 2024 - peninsula-press.ae
The rise of cloud computing has brought significant advancements in scalability, flexibility,
and cost-efficiency, with multi-tenancy emerging as a core feature that allows multiple …

Transforming digitization in supply chain management using artificial intelligence and machine learning

C Singh, AK Das - Supply Chain Management, 2024 - taylorfrancis.com
The industries underwent enormous transformation in the past century, which is a major
economic and technical factor in the lives of nations that are connected to it. The …

基于SM9 的公钥可搜索加密方案

蒲浪, 林超, 伍玮, 何德彪 - 信息安全学报, 2023 - jcs.iie.ac.cn
云存储技术因其使用便捷, 性价比高等优势得以迅速发展, 越来越多用户将个人数据外包至第
三方云服务器存储. 虽然数据加密存储可有效保护数据安全和用户隐私, 但传统的对称/非对称 …

Vulnerability Assessment of Security Breach and Deadly Threat in Cloud Computing Environment

A Gupta, S Sinha, HK Singh… - 2023 IEEE 15th …, 2023 - ieeexplore.ieee.org
Cloud computing allows us to access available systems and pay for what we require
whenever needed. When there is access to the internet, it uses some techniques like …

Research on Cloud Office Resource Allocation Algorithm Based on Correction Weight PSO

G Wang, C Wang, T Gan, J An - International Conference on Artificial …, 2022 - Springer
With the development of science and technology, cloud computing technology has changed
people's office methods. People begin to use cloud services to realize remote collaborative …

[PDF][PDF] AWS Tools and Services to Manage Cloud Security Concerns

S Chopra, A Nayyar, S Kaur, G Singh, R Sharma… - researchgate.net
Cloud computing has become an indispensable component of contemporary businesses
due to its numerous benefits such as scalability and cost-effectiveness. However, security …