The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud storage service has been increasing in popularity as cloud computing plays an important role in the IT domain. Users can be relieved of the burden of storage and computation, by outsourcing the large data files to the cloud servers. However, from the cloud service providers' point of view, it is wise to utilize the data deduplication techniques to reduce the costs of running large storage system...
In recent times, cloud computing has become a boon for data storage in information technology. In parallel, data storage also undergoes major issues in confidentiality. Lot of techniques are in use for ensuring confidentiality of data. The available techniques are not in a position to fully protect data. And here comes the obfuscation techniques to handle the malicious hackers. These obfuscation techniques...
Cloud computing is a type of online based computing that gives shared computer dealing out resources & data to the computers. It is dreadfully challenging part to maintain the safety of all required data that are wanted in various applications for the user in cloud. The data stored in the cloud may not be wholly responsible. So, the cloud storage contributors are in charge for monitoring the data...
Emerging technologies in cloud environment have not only increased its use but also posed some severe issues. These issues can cause considerable harm not only to data storage but also to the large amount of data in distributed file structure which are being used in collaborative sharing. The data sharing technique in the cloud is prone to many flaws and is easily attacked. The conventional cryptographic...
Security of the outsourced data has become the core problem of cloud computing. Many security models have been proposed, among which, CP-ABE has gained popularity in this research area. The Ciphertext-Policy Attribute Based Encryption (CP-ABE) is considered as a propitious tool for fine grained data access in the cloud storage system. The existing CP-ABE scheme with only one authority does not solve...
Now-a-days we are leading a life with world wide access technologies. Cloud computing is one of such technologies via which we can ensure security, disaster recovery, and better availability of data. Cloud computing basically focus on deployment of remote servers and software network together. Cloud computing allows us online access of the resource remotely. It benefits us while we use it for distributed...
This paper proposes two-factor authentication protocol for adding security layer to USB digital evidence acquisition devices, and preventing illegal usage of data stored in that devices from unauthorized users. By using one time password generated from unique parameters of individual user, the proposed protocol can be used to protect forensic acquisition software and sensitive information stored in...
Cloud computing model is very exciting model especially for business peoples. Many business peoples are getting attracted towards cloud computing model because of the features easy to manage, device independent, location independent. But this cloud models comes with many security issues. A business person keeps crucial information on cloud, so security of data is crucial issue as probability of hacking...
Cloud Computing has attracted much attention recently with all its benefits in providing data availability anytime, anywhere, on any device. The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-per-use service business model known as cloud computing. Cloud data storage redefines the security issues targeted on customers' out-sourced data (data...
Providing top-$k$ query services is relevant for storage servers which collect valuable files/data and process queries for data owners and mobile users. However, this kind of service could incur severe security concerns, because hackers or even the managers/administrators of the servers may steal important data sets and deceive users into responding to forged or incomplete query results. Therefore,...
Web applications are increasingly adopting the client side storage rather than in server side. In fact, client side storage can be achieved by external plugins, libraries or HTML5 APIS. It ensures a high user's quality of experience, offline application usage and server load reduction. In this work, we focus on the privacy and availability of confidential data explored by HTML5 Local Storage API....
In the era of rampant adoption of information technology and social networking, data generation is rapidly outpacing data storage resources. Cloud computing has emerged as cost effective, flexible and scalable alternate to address issue of increasing resource requirements. Though the advantages offered by such services appear attractive, there are certain inherent challenges related to trust and data...
Deduplication is an important technique to save the storage cost at the cloud storage server. Image is an important data type stored in cloud, but rarely discussed in previous work on deduplication. This paper studies the problem of validating the deduplication of image storage in cloud. In particular, we consider the task of allowing a cloud server to verify the correctness of deduplication. Our...
Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the content of the original files. In practice, the original files will be removed by the owner for the sake of space efficiency. Hence, the issues on...
Cloud computing has been flourishing in past years because of its ability to provide users with on-demand, flexible, reliable, and low-cost services. With more and more cloud applications being available, data security protection becomes an important issue to the cloud. In order to ensure data security in cloud data storage, a novel triple encryption scheme is proposed in this paper, which combines...
Globalized services economy is increasingly adopting cloud computing in which applications, platforms, and infrastructre are available as services. Huge volume of data including sensitive data is outsourced and stored remotely in public clouds. There is a need for efficient protection of the privacy and security of users and their data without affecting its utility to authorized users. There needs...
Cloud storage system enables storing of data in the cloud server efficiently and makes the user to work with the data without any trouble of the resources. In the existing system, the data are stored in the cloud using dynamic data operation with computation which makes the user need to make a copy for further updating and verification of the data loss. An efficient distributed storage auditing mechanism...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.