Truststore: Making amazon s3 trustworthy with services composition
The enormous amount of data generated in daily operations and the increasing demands for
data accessibility across organizations are pushing individuals and organizations to …
data accessibility across organizations are pushing individuals and organizations to …
Athos: Efficient authentication of outsourced file systems
We study the problem of authenticated storage, where we wish to construct protocols that
allow to outsource any complex file system to an untrusted server and yet ensure the file …
allow to outsource any complex file system to an untrusted server and yet ensure the file …
Efficient integrity checking of untrusted network storage
A Heitzmann, B Palazzi, C Papamanthou… - Proceedings of the 4th …, 2008 - dl.acm.org
Outsourced storage has become more and more practical in recent years. Users can now
store large amounts of data in multiple servers at a relatively low price. An important issue …
store large amounts of data in multiple servers at a relatively low price. An important issue …
iDataGuard: Middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an
interoperable security middleware that allows users to outsource their file systems to …
interoperable security middleware that allows users to outsource their file systems to …
A seamless and reliable distributed network file system utilizing webspace
HC Chao, TJ Liu, KH Chen… - 2008 10th International …, 2008 - ieeexplore.ieee.org
A distributed file system integrates the storage devices on the network and stores files on
remote file servers so that clients can access them through Internet anytime and anywhere …
remote file servers so that clients can access them through Internet anytime and anywhere …
iDataGuard: an interoperable security middleware for untrusted internet data storage
Businesses that provide data storage facilities on the internet (IDP) have exploded recently.
Such businesses provide the following benefits to end users: a) anytime, anywhere access …
Such businesses provide the following benefits to end users: a) anytime, anywhere access …
Enhancement of provable data possession algorithm
KK Kumar, A Balaram, M Ravi, HV Rao - AIP Conference Proceedings, 2023 - pubs.aip.org
In modern era data storage outsourcing as well as resource sharing amongst the network
services plays a vital role. But the next thing into the focus would be preserving the virtue of …
services plays a vital role. But the next thing into the focus would be preserving the virtue of …
Secure computation on outsourced data: A 10-year retrospective
LNCS 8421 - Secure Computation on Outsourced Data: A 10-year Retrospective Page 1
Secure Computation on Outsourced Data: A 10-year Retrospective Hakan Hacıgümüs1, Bala …
Secure Computation on Outsourced Data: A 10-year Retrospective Hakan Hacıgümüs1, Bala …
Global heuristic search on encrypted data (GHSED)
M Halloush, M Sharif - arxiv preprint arxiv:0909.2366, 2009 - arxiv.org
Important document are being kept encrypted in remote servers. In order to retrieve these
encrypted data, efficient search methods needed to enable the retrieval of the document …
encrypted data, efficient search methods needed to enable the retrieval of the document …
Securing nonintrusive web encryption through information flow
L Zheng, AC Myers - Proceedings of the third ACM SIGPLAN workshop …, 2008 - dl.acm.org
This paper proposes a nonintrusive encryption mechanism for protecting data confidentiality
on the Web. The core idea is to encrypt confidential data before sending it to untrusted sites …
on the Web. The core idea is to encrypt confidential data before sending it to untrusted sites …