From security to assurance in the cloud: A survey
The cloud computing paradigm has become a mainstream solution for the deployment of
business processes and applications. In the public cloud vision, infrastructure, platform, and …
business processes and applications. In the public cloud vision, infrastructure, platform, and …
Secure data sharing in the cloud
Secure Data Sharing in the Cloud | SpringerLink Skip to main content Advertisement
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …
Threshold cryptography based data security in cloud computing
Cloud computing is very popular in organizations and institutions because it provides
storage and computing services at very low cost. However, it also introduces new …
storage and computing services at very low cost. However, it also introduces new …
[HTML][HTML] EECDH to prevent MITM attack in cloud computing
S Anand, V Perumal - Digital Communications and Networks, 2019 - Elsevier
Cloud computing has reached the peak of Gartner hype cycle, and now the focus of the
whole telecom industry is the ability to scale data storage with minimal investment. But data …
whole telecom industry is the ability to scale data storage with minimal investment. But data …
Management of symmetric cryptographic keys in cloud based environment
Although, cloud computing provides innumerable benefits to its customers but it fails to solve
information security concerns especially in public cloud. Symmetric Cryptographic Key is …
information security concerns especially in public cloud. Symmetric Cryptographic Key is …
iPrivacy: a distributed approach to privacy on the cloud
The increasing adoption of Cloud storage poses a number of privacy issues. Users wish to
preserve full control over their sensitive data and cannot accept that it to be accessible by …
preserve full control over their sensitive data and cannot accept that it to be accessible by …
Handling confidential data on the untrusted cloud: an agent-based approach
Cloud computing allows shared computer and storage facilities to be used by a multitude of
clients. While cloud management is centralized, the information resides in the cloud and …
clients. While cloud management is centralized, the information resides in the cloud and …
A Distributed Approach to Privacy on the Cloud
F Pagano - arxiv preprint arxiv:1503.08115, 2015 - arxiv.org
The increasing adoption of Cloud-based data processing and storage poses a number of
privacy issues. Users wish to preserve full control over their sensitive data and cannot …
privacy issues. Users wish to preserve full control over their sensitive data and cannot …
A survey on security over data outsourcing
M Thangavel, P Varalakshmi - 2014 Sixth International …, 2014 - ieeexplore.ieee.org
Today's world business depends on outsourcing the computing and storage. Lack of
Security on Data Outsourcing is an important issue and becomes one of the wider areas in …
Security on Data Outsourcing is an important issue and becomes one of the wider areas in …
LIFE: a lightweight and flexible key management scheme for securely and pervasively file editing in mobile cloud computing
W Ren, J Lin, Q Cao, L Ma - International Journal of Internet …, 2014 - inderscienceonline.com
As cloud servers provide on-demand and on-line storage services, it is possible for mobile
users to work any-time and any-where by using hand-held smart devices. Mobile users …
users to work any-time and any-where by using hand-held smart devices. Mobile users …