Jabbar et al., 2017 - Google Patents
Design and implementation of hybrid EC-RSA security algorithm based on TPA for cloud storageJabbar et al., 2017
View PDF- Document ID
- 6179237371839429591
- Author
- Jabbar A
- Lilhore P
- Publication year
- Publication venue
- International Journal Online of Science
External Links
Snippet
Cloud computing within which information is maintained, managed, secured remotely and created available to users over a network. The user concerning about the integrity of data hold on within the cloud because the user's data will be attacked or changed by outside …
- 229920000406 phosphotungstic acid polymer 0 title 1
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| More et al. | Third party public auditing scheme for cloud storage | |
| Hiremath et al. | A novel data auditing approach to achieve data privacy and data integrity in cloud computing | |
| CN106534092A (en) | Message-based and key-dependent privacy data encryption method | |
| Jalil et al. | A secure and efficient public auditing system of cloud storage based on BLS signature and automatic blocker protocol | |
| Selvamani et al. | A review on cloud data security and its mitigation techniques | |
| CN101552676B (en) | Host module legitimacy verification method, system and device using a card module | |
| Chidambaram et al. | Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique | |
| CN114553557B (en) | Key calling method, device, computer equipment and storage medium | |
| Jabbar et al. | Design and implementation of hybrid EC-RSA security algorithm based on TPA for cloud storage | |
| CN114942729A (en) | Data safety storage and reading method for computer system | |
| Hussien et al. | Scheme for ensuring data security on cloud data storage in a semi-trusted third party auditor | |
| Adokshaja et al. | Third party public auditing on cloud storage using the cryptographic algorithm | |
| Navajothi et al. | An efficient, dynamic, privacy preserving public auditing method on untrusted cloud storage | |
| CN118611877A (en) | A device identification access control method and system | |
| KR20030097550A (en) | Authorization Key Escrow Service System and Method | |
| Keerthana et al. | Slicing, Tokenization, and Encryption Based Combinational Approach to Protect Data-at-Rest in Cloud Using TF-Sec Model | |
| Patil et al. | Efficient privacy preserving and dynamic public auditing for storage cloud | |
| Hammami et al. | Security issues in cloud computing and associated alleviation approaches | |
| Shah et al. | Third party public auditing scheme for security in cloud storage | |
| Kodada et al. | FSACE: finite state automata-based client-side encryption for secure data deduplication in cloud computing | |
| ArockiamȦ et al. | Security framework to ensure the confidentiality of outsourced data in public cloud storage | |
| Reddy et al. | Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques | |
| Banerjee et al. | A nobel cryptosystem for group data sharing in cloud storage | |
| Ramya et al. | A review on security aspects of data storage in cloud computing | |
| Jain | Enhancing security in Tokenization using NGE for storage as a service |