Bhagyashri et al., 2014 - Google Patents
A survey on privacy preserving techniques for secure cloud storageBhagyashri et al., 2014
View PDF- Document ID
- 4984767800748060532
- Author
- Bhagyashri S
- Gurave Y
- Publication year
- Publication venue
- International Journal of Computer Science and Mobile Computing (IJCSMC)
External Links
Snippet
Cloud computing is the technology which enables obtaining resources like so services, software, hardware over the internet. With cloud storage users can store their data remotely and enjoy on-demand services and application from the configurable resources. The cloud …
- 238000000034 method 0 title abstract description 29
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ali et al. | SeDaSC: secure data sharing in clouds | |
Zhao et al. | Trusted data sharing over untrusted cloud storage providers | |
Dubey et al. | Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment | |
Selvamani et al. | A review on cloud data security and its mitigation techniques | |
Kumar et al. | Data outsourcing: A threat to confidentiality, integrity, and availability | |
Azougaghe et al. | An efficient algorithm for data security in cloud storage | |
Nakouri et al. | A new biometric-based security framework for cloud storage | |
Jayalekshmi et al. | A study of data storage security issues in cloud computing | |
Bhagyashri et al. | Privacy-preserving public auditing for secure cloud storage | |
Joseph et al. | Survey on privacy-preserving methods for storage in cloud computing | |
Thangavel et al. | An analysis of privacy preservation schemes in cloud computing | |
Hussien et al. | Scheme for ensuring data security on cloud data storage in a semi-trusted third party auditor | |
Bhagyashri et al. | A survey on privacy preserving techniques for secure cloud storage | |
Rewadkar et al. | Cloud storage system enabling secure privacy preserving third party audit | |
Bharathy et al. | Securing Data stored in clouds using privacy preserving authenticated access control | |
Guha et al. | Review of information authentication in mobile cloud over SaaS & PaaS layers | |
Sohal et al. | Enhancement of cloud security using DNA inspired multifold cryptographic technique | |
Hammami et al. | Security issues in cloud computing and associated alleviation approaches | |
Taylor et al. | Security approaches and crypto algorithms in mobile cloud storage environment to ensure data security | |
Chandinee Saraswathy et al. | HLA based third party auditing for secure cloud storage | |
Zkik et al. | A New Authentication and Homomorphic Encryption as a Service Model for Preserving Privacy in Clouds. | |
Gagged et al. | Improved secure dynamic bit standard technique for a private cloud platform to address security challenges | |
Kaur et al. | Enhancement in homomorphic encryption scheme for cloud data security | |
Mamatha et al. | Use of digital signature with diffie hellman key exchange and hybrid cryptographic algorithm to enhance data security in cloud computing | |
Attia et al. | E-mail systems in cloud computing environment privacy, trust and security challenges |