[go: up one dir, main page]

Jabbar et al., 2017 - Google Patents

Design and implementation of hybrid EC-RSA security algorithm based on TPA for cloud storage

Jabbar et al., 2017

View PDF
Document ID
6179237371839429591
Author
Jabbar A
Lilhore P
Publication year
Publication venue
International Journal Online of Science

External Links

Snippet

Cloud computing within which information is maintained, managed, secured remotely and created available to users over a network. The user concerning about the integrity of data hold on within the cloud because the user's data will be attacked or changed by outside …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
More et al. Third party public auditing scheme for cloud storage
Hiremath et al. A novel data auditing approach to achieve data privacy and data integrity in cloud computing
CN106534092A (en) Message-based and key-dependent privacy data encryption method
Jalil et al. A secure and efficient public auditing system of cloud storage based on BLS signature and automatic blocker protocol
Selvamani et al. A review on cloud data security and its mitigation techniques
CN101552676B (en) Host module legitimacy verification method, system and device using a card module
Chidambaram et al. Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique
CN114553557B (en) Key calling method, device, computer equipment and storage medium
Jabbar et al. Design and implementation of hybrid EC-RSA security algorithm based on TPA for cloud storage
CN114942729A (en) Data safety storage and reading method for computer system
Hussien et al. Scheme for ensuring data security on cloud data storage in a semi-trusted third party auditor
Adokshaja et al. Third party public auditing on cloud storage using the cryptographic algorithm
Navajothi et al. An efficient, dynamic, privacy preserving public auditing method on untrusted cloud storage
CN118611877A (en) A device identification access control method and system
KR20030097550A (en) Authorization Key Escrow Service System and Method
Keerthana et al. Slicing, Tokenization, and Encryption Based Combinational Approach to Protect Data-at-Rest in Cloud Using TF-Sec Model
Patil et al. Efficient privacy preserving and dynamic public auditing for storage cloud
Hammami et al. Security issues in cloud computing and associated alleviation approaches
Shah et al. Third party public auditing scheme for security in cloud storage
Kodada et al. FSACE: finite state automata-based client-side encryption for secure data deduplication in cloud computing
ArockiamȦ et al. Security framework to ensure the confidentiality of outsourced data in public cloud storage
Reddy et al. Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques
Banerjee et al. A nobel cryptosystem for group data sharing in cloud storage
Ramya et al. A review on security aspects of data storage in cloud computing
Jain Enhancing security in Tokenization using NGE for storage as a service