The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
These days each data moves toward becoming hard-ware and put away as Databases, which thusly may encase most levered private, monetary, and administration truths. As the information have important resources for the clients, it additionally most extreme foreseen to the mean adversaries and in this way, to secure in inconsistency of every single potential adversary activities is basic. These days the...
Privacy and confidentiality in communication with a public entity, especially when this communication is about issues related to security (i.e. reporting criminal activity is paramount. The guarantees that the reporting system can provide to end users directly contribute to the overall success of the system while of utmost importance, that can greatly influence whether the system is used or not is...
The keys generated by (symmetric or asymmetric) have been still compromised by attackers. Cryptography algorithms need extra efforts to enhance the security of keys that are transferring between parities. Also, using cryptography algorithms increase time consumption and overhead cost through communication. Encryption is very important issue for protecting information from stealing. Unfortunately encryption...
The Cloud Computing is a developing IT concept that faces some issues, which are slowing down its evolution and adoption by users across the world. The lack of security has been the main concern. Organizations and entities need to ensure, inter alia, the integrity and confidentiality of their outsourced sensible data within a cloud provider server. Solutions have been examined in order to strengthen...
Cloud computing is a powerful service that allows the cloud users to utilize the resources located in the cloud servers by pay-per-use or charge-per-use mode through the internet. The cloud users are enjoying the on-demand services provided by the cloud computing environment without maintaining the data in a local system. Even though the service is offered to cloud users in an efficient way, there...
In recent times, cloud computing has become a boon for data storage in information technology. In parallel, data storage also undergoes major issues in confidentiality. Lot of techniques are in use for ensuring confidentiality of data. The available techniques are not in a position to fully protect data. And here comes the obfuscation techniques to handle the malicious hackers. These obfuscation techniques...
Mobile technologies have become increasingly essential in our life as they offer great possibilities of uses, to users. Mobile cloud computing is a new paradigm that allows users to fully utilize mobile technologies exceeding the resources calculation limit. This exponential use of cloud services through mobile devices has allowed users to download, to share and retrieve their personal data anywhere...
Cloud computing has gained substantial research interest, owing to its vast range of services. The major issues in cloud computing are its security and privacy. The term security has multiple facets such as confidentiality, availability and integrity. A perfect security solution must ensure all the security parameters effectively. This paper focuses on the security of data alone. This paper intends...
In cloud computing the security features still remains a big problem during its deployment. The security threats are under research proposing several techniques for overcoming the threats. Focusing on security issues the cloud computing gives rise to several independent features which paves way for security observations, techniques and frameworks. The paper summarizes the security benefits in deploying...
Now a day's cloud computing is power station to run multiple businesses. It is cumulating more and more users every day. Database-as-a-service is service model provided by cloud computing to store, manage and process data on a cloud platform. Database-as-a-service has key characteristics such as availability, scalability, elasticity. A customer does not have to worry about database installation and...
Now a days every industry needs more income with less investment behind infrastructure. Here, the new era of Cloud computing comes where the user can have everything on rent and "pay as go" fundamental. Cloud users are able to store their valuable data on Cloud premises and make themselves free from local burden. While users data is available on Cloud servers, it is very important for the...
Deduplication on encrypted data is a promising trend for both cloud storage providers and subscribers. Data deduplication allows cloud storage providers (CSP) to save storage space by eliminating the copies of the same data. Data encryption can ensure the confidentiality of customer's data both in transit and at rest. However, deduplication that works on detecting identical data does not work well...
With the emergence of cloud computing, the concept of information security has become a major issue. Indeed, the security of such a system is the greatest concern of computer scientists, providers of cloud and organizations who want to adopt and benefit from these services. Cloud computing providers must implement concepts ensuring network security, hardware, data storage and strategies of control...
VNC has long been used a means of providing remote connectivity between computer systems, but is all too often deployed in an insecure configuration. This paper describes an auditing tool that can be used to identify the presence of insecure UltraVNC installs within a Microsoft Windows Domain environment.
Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore how to provide cloud users with more controls so that they could ensure confidentiality of their data without using extensive public key encryption in cloud networking or sharing...
This paper presents security requirements, risk survey, security objectives, and security controls of the Bluetooth Low Energy (BLE) based Catcher devices and the related Microdata Ecosystem of Ceruus company for a secure, energy efficient and scalable wireless content distribution. The system architecture was composed of the Mobile Cellular Network (MCN) based gateway/edge router device, such as...
This paper revisits the issue of secure outsourcing of services. It proposes a data scrambling approach of transforming private data into public without public key encryption in the cloud computing context. The approach is applicable to non-ordering integer data type used in matrix multiplication. The paper applies row-column shuffling to matrices, and adds random noises to data in order to hide actual...
With the continuous and exponential increase of the number of users and the size of their data, data deduplication becomes more and more a necessity for cloud storage providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. The advantages of deduplication unfortunately come with a high cost in terms of new security and privacy challenges...
Research has shown that data security has always been an important aspect of quality of service for data service providers; but cloud computing poses new and challenging security threats. The most common security concerns for users of cloud storage are data confidentiality, integrity and availability. Microsoft has considered these concerns and responded with the Azure virtual private storage based...
File replication in distributed environment has been discussed by many researchers, but the issues like confidentiality and integrity of files during replication are rarely focused, when deployed in the cloud environment. Distributed computing started with the cluster followed by the grid and is now era of cloud computing, where most of the services are accessed, by few clicks. In cloud, services...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.