secure cloud storage
Recently Published Documents


TOTAL DOCUMENTS

197
(FIVE YEARS 78)

H-INDEX

17
(FIVE YEARS 4)

2022 ◽  
Vol 32 (3) ◽  
pp. 1509-1524
Author(s):  
A. Indumathi ◽  
G. Sumathi

2021 ◽  
pp. 1003-1010
Author(s):  
S. V. Reshma ◽  
J. Ritisha ◽  
S. M. Pai ◽  
K. R. Sneha ◽  
G. Shruthi

2021 ◽  
Vol 9 ◽  
Author(s):  
Sudha Senthilkumar ◽  
K. Brindha ◽  
Natalia Kryvinska ◽  
Sweta Bhattacharya ◽  
Giridhar Reddy Bojja

The advent of the internet has brought an era of unprecedented connectivity between networked devices, making one distributed computing, called cloud computing, and popular. This has also resulted in a dire need for remote authentication schemes for transferring files of a sensitive nature, especially health-related information between patients, smart health cards, and cloud servers via smart health card solution providers. In this article, we elaborate on our proposed approach for such a system and accomplish an informal analysis to demonstrate the claim that this scheme provides sufficient security while maintaining usability.


2021 ◽  
Vol 11 (4) ◽  
pp. 7321-7325
Author(s):  
M. F. Hyder ◽  
S. Tooba ◽  
. Waseemullah

In this paper, the implementation of the General Secure Cloud Storage Protocol is carried out and instantiated by a multiplicatively Homomorphic Encryption Scheme (HES). The protocol provides a system for secure storage of data over the cloud, thereby allowing the client to carry out the operational tasks on it efficiently. The work focuses on the execution of five major modules of the protocol. We also evaluate the performance of the protocol with respect to the computation cost of these modules on the basis of different security parameters and datasets by conducting a series of experiments. The cloud was built using OpenStack and the data were outsourced from the client’s system to the cloud to study the security features and performance metrics when adopting the cloud environment.


Author(s):  
Saravanan Manikandan ◽  
Islam M. D. Saikhul ◽  
Hsing-Chung Chen ◽  
Yu-Lin Song

2021 ◽  
Vol 23 (07) ◽  
pp. 1388-1395
Author(s):  
Ms.Srilakshmi U Sirurmath ◽  
◽  
Dr. Deepashree Devaraj ◽  

Cloud technology has exponentially seen a rise in its absorption for various applications. Cloud users with limited storage might transfer their information to remote systems. In return for monetary compensation, these servers provide access to their clients’ data. Cloud storage protocols verify the integrity of this data which is hosted on the cloud. Broadly there are two types of data – static and dynamic. While many efficient protocols are already present for static data, much research is being undertaken to build a secure cloud storage system for dynamic data. This paper analyzes these existing and proposed cloud storage protocols for both static and dynamic data. Important performance parameters are identified and a comparison is drawn between the chosen methods in order to draw a contrast between the efficiency of the techniques chosen.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Haibin Yang ◽  
Zhengge Yi ◽  
Ruifeng Li ◽  
Zheng Tu ◽  
Xu An Wang ◽  
...  

With the advent of data outsourcing, how to efficiently verify the integrity of data stored at an untrusted cloud service provider (CSP) has become a significant problem in cloud storage. In 2019, Guo et al. proposed an outsourced dynamic provable data possession scheme with batch update for secure cloud storage. Although their scheme is very novel, we find that their proposal is not secure in this paper. The malicious cloud server has ability to forge the authentication labels, and thus it can forge or delete the user’s data but still provide a correct data possession proof. Based on the original protocol, we proposed an improved one for the auditing scheme, and our new protocol is effective yet resistant to attacks.


Author(s):  
Aqsa Mohiyuddin ◽  
Abdul Rehman Javed ◽  
Chinmay Chakraborty ◽  
Muhammad Rizwan ◽  
Maryam Shabbir ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document