Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2010
We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. We describe, at a high level, several architectures that combine recent and non-standard cryptographic primitives in order to achieve our goal. We survey the benefits such an architecture would provide to both customers and service providers and give an overview of recent advances in cryptography motivated specifically by cloud storage.
As an emerging technology and business paradigm, Cloud Computing has taken commercial computing by storm. Cloud computing platforms provide easy access to a company's high-performance computing and storage infrastructure through web services. We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. We describe, at a high level, several architectures that combine recent and non-standard cryptographic primitives in order to achieve our goal. We survey the benefits such an architecture would provide to both customers and service providers and give an overview of recent advances in cryptography motivated specifically by cloud storage.
Communications in Computer and Information Science
New Secure Storage Architecture for Cloud Computing2011 •
International Journal For Multidisciplinary Research
Cloud Cryptography: A Glance at Its DevelopmentThe use of encryption methods to safeguard data that is processed or stored in the cloud is known as cloud cryptography. As it helps to prevent unauthorised access, disclosure, modification, or destruction of data, it is a crucial security mechanism for cloud computing. The field of cloud cryptography is complicated and developing. It's critical to stay current with the most recent cryptographic methods and protocols as new threats and weaknesses appear Cloud security includes cloud cryptography, which is crucial. Organisations can safeguard their data from unauthorised access, modification, and destruction by utilising encryption techniques.
We propose a new decentralized access control scheme for protected data storage in clouds that affirms anonymous authentication. In this paper, the cloud verifies the authenticity without knowing the user’s identity before storing data. Our paper has the added feature of access control in which only validated users are able to decrypt the stored information. Here we also forbid replay attacks and supports creation, modification, and reading of information stored in the cloud. We also cover user revocation and here the authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized.
2017 •
We propose a hybrid two-factor data security protection mechanism in the form of a cryptosystem with factor revo-cability for cloud storage systems. This identity-based encryption (IBE) system allows the sender to send an encrypted message through a cloud storage server to a receiver. The identity of the receiver is the only information that the sender needs to know. No other information (such as its certificate) is required. The receiver is required to possess two things so as to decrypt the ciphertext. The first thing being the secret key stored in his/her personal computer. This secret key has two parts-one static human-set part and a dynamic part (generated upon every instance of file uploaded). The second one is a unique personal security device which is used to connect to the computer. It is absolutely not possible to decrypt the ciphertext without either piece as mentioned above. Also, more importantly once the security device is stolen or lost, this device can be revoked. It...
Computer Communications
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms2017 •
Citation/Export MLA Vaishali B N, Preethi S, “Comparative Study of Public-key cryptosystems in Cloud Storage”, March 15 Volume 3 Issue 3 , International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 1572 - 1576, DOI: 10.17762/ijritcc2321-8169.1503147 APA Vaishali B N, Preethi S, March 15 Volume 3 Issue 3, “Comparative Study of Public-key cryptosystems in Cloud Storage”, International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 1572 - 1576, DOI: 10.17762/ijritcc2321-8169.1503147
2013 •
Cloud computing technology is very useful in present day to day life, it uses the internet and the central remote servers to provide and maintain data as well as applications. Such applications in turn can be used by the end users via the cloud communications without any installation. Moreover, the end users' data files can be accessed and manipulated from any other computer using the internet services. Despite the flexibility of data and application accessing and usage that cloud computing environments provide, there are many questions still coming up on how to gain a trusted environment that protect data and applications in clouds from hackers and intruders. This paper surveys the "keys generation and management" mechanism and encryption/decryption algorithms used in cloud computing environments, we proposed new security architecture for cloud computing environment that considers the various security gaps as much as possible. A new cryptographic environment that impl...
Revolutions in International Law The Legacies of 1917
Law, Class Struggle and Nervous Breakdowns2021 •
Journal of Composites Science
Synthesis of CuO/ZnO Nanocomposites and Their Application in Photodegradation of Toxic Textile Dye2019 •
Tópicos em Ciências Agrárias - Volume 5
Avaliação de enraizador comercial em diferentes tipos de estacas de rosa do desertoPlant Archives
Impact of agricultural technology management agency on rural economy of Nagaland, India2017 •
Journal of technology management & innovation
A Study of Culture Dimensions, Organizational Ambidexterity, and Perceived Innovation in Teams2014 •
Journal of Islamabad Medical & Dental College
The Expression of Progesterone Receptors in Meningiomas of Different Grades2019 •
Zenodo (CERN European Organization for Nuclear Research)
Participatory Certification Systems: Social Innovation, Eco-Innovation or Deterritorialization?2023 •
IFIP International Federation for Information Processing
Error Simulation in a Maturity Environment for Software Engineering Teaching2020 •
Sprach-und Kultur(ver)mittlung Language and cultural mediation
Aktuelle Fiktionalisierungsformen der juristischen Aufarbeitung nationalsozialistischer Verbrechen am Beispiel von Der Fall Collini von Ferdinand von Schirach (2011) und Deutsches Haus von Annette Hess (2018)2022 •