Balogh et al., 2016 - Google Patents
Modeling of data security in cloud computingBalogh et al., 2016
View PDF- Document ID
- 6869365754615096879
- Author
- Balogh Z
- Turčáni M
- Publication year
- Publication venue
- 2016 Annual IEEE Systems Conference (SysCon)
External Links
Snippet
The paper describes the modeling design of data security in Cloud Computing. Data security can be defined as confidence and integrity maintenance of data processed by an organization. In the paper, dealing with data security in all layers of cloud computing is …
- 238000003860 storage 0 abstract description 66
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105939191B (en) | The client secure De-weight method of ciphertext data in a kind of cloud storage | |
More et al. | Third party public auditing scheme for cloud storage | |
Ni et al. | On the security of an efficient dynamic auditing protocol in cloud storage | |
Balogh et al. | Modeling of data security in cloud computing | |
US7246379B2 (en) | Method and system for validating software code | |
CN109003083A (en) | A kind of ca authentication method, apparatus and electronic equipment based on block chain | |
KR20180116278A (en) | Common information secrets for secure information exchange and hierarchical and deterministic cryptographic keys | |
Nirmala et al. | Data confidentiality and integrity verification using user authenticator scheme in cloud | |
Kaur et al. | Enhanced cloud computing security and integrity verification via novel encryption techniques | |
Hussein et al. | A survey of cryptography cloud storage techniques | |
Kumar et al. | Data outsourcing: A threat to confidentiality, integrity, and availability | |
Sarkar et al. | A framework to ensure data storage security in cloud computing | |
Mukundan et al. | Replicated Data Integrity Verification in Cloud. | |
Jayalekshmi et al. | A study of data storage security issues in cloud computing | |
Kaur et al. | Security in cloud computing using hybrid of algorithms | |
Schwab et al. | Entity authentication in a mobile-cloud environment | |
Ramprasath et al. | Protected data sharing using attribute based encryption for remote data checking in cloud environment | |
Mohammed et al. | Secure third party auditor (tpa) for ensuring data integrity in fog computing | |
Navajothi et al. | An efficient, dynamic, privacy preserving public auditing method on untrusted cloud storage | |
Hlaing et al. | Secure One Time Password OTP Generation for user Authentication in Cloud Environment | |
Salim et al. | Applying geo-encryption and attribute based encryption to implement secure access control in the cloud | |
Lee et al. | Hybrid provable data possession at untrusted stores in cloud computing | |
Bhagyashri et al. | A survey on privacy preserving techniques for secure cloud storage | |
George et al. | Improved multi‐party verification protocol with reduced computational overhead in cloud storage system | |
Keerthana et al. | Slicing, Tokenization, and Encryption Based Combinational Approach to Protect Data-at-Rest in Cloud Using TF-Sec Model |