Nothing Special   »   [go: up one dir, main page]

Balogh et al., 2016 - Google Patents

Modeling of data security in cloud computing

Balogh et al., 2016

View PDF
Document ID
6869365754615096879
Author
Balogh Z
Turčáni M
Publication year
Publication venue
2016 Annual IEEE Systems Conference (SysCon)

External Links

Snippet

The paper describes the modeling design of data security in Cloud Computing. Data security can be defined as confidence and integrity maintenance of data processed by an organization. In the paper, dealing with data security in all layers of cloud computing is …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
CN105939191B (en) The client secure De-weight method of ciphertext data in a kind of cloud storage
More et al. Third party public auditing scheme for cloud storage
Ni et al. On the security of an efficient dynamic auditing protocol in cloud storage
Balogh et al. Modeling of data security in cloud computing
US7246379B2 (en) Method and system for validating software code
CN109003083A (en) A kind of ca authentication method, apparatus and electronic equipment based on block chain
KR20180116278A (en) Common information secrets for secure information exchange and hierarchical and deterministic cryptographic keys
Nirmala et al. Data confidentiality and integrity verification using user authenticator scheme in cloud
Kaur et al. Enhanced cloud computing security and integrity verification via novel encryption techniques
Hussein et al. A survey of cryptography cloud storage techniques
Kumar et al. Data outsourcing: A threat to confidentiality, integrity, and availability
Sarkar et al. A framework to ensure data storage security in cloud computing
Mukundan et al. Replicated Data Integrity Verification in Cloud.
Jayalekshmi et al. A study of data storage security issues in cloud computing
Kaur et al. Security in cloud computing using hybrid of algorithms
Schwab et al. Entity authentication in a mobile-cloud environment
Ramprasath et al. Protected data sharing using attribute based encryption for remote data checking in cloud environment
Mohammed et al. Secure third party auditor (tpa) for ensuring data integrity in fog computing
Navajothi et al. An efficient, dynamic, privacy preserving public auditing method on untrusted cloud storage
Hlaing et al. Secure One Time Password OTP Generation for user Authentication in Cloud Environment
Salim et al. Applying geo-encryption and attribute based encryption to implement secure access control in the cloud
Lee et al. Hybrid provable data possession at untrusted stores in cloud computing
Bhagyashri et al. A survey on privacy preserving techniques for secure cloud storage
George et al. Improved multi‐party verification protocol with reduced computational overhead in cloud storage system
Keerthana et al. Slicing, Tokenization, and Encryption Based Combinational Approach to Protect Data-at-Rest in Cloud Using TF-Sec Model