The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For a long time, the sensitivity and criticality of data storage, processing, and transmission have hindered the wide utilization of IT and networks in the health care systems. Recently, the high availability, reachability, reliability, efficiency, usability and automation provided by the different cloud computing models paved the way to integrate the e-health systems with these cloud services to...
Cloud computing is rather new, and there're, of course, concerns like data-protection. This technology is developing as a standard for data-sharing on remote storages. Cloud has been able to convince users and companies' owners to transfer their data to Cloud so they can use Cloud resources and reduce their costs. Due to importance of data for its owners, there's always concern about security. When...
Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network. It has emerged as the key technology that unleashes the potency of Big Data, Internet of Things, Mobile and Web Applications, and other related technologies; but it also comes with its...
Cloud computing has brought much convenience to human life, however, how to realize secure and fine-grained authentication of the data stored in the cloud is an urgent issue. In this paper, we center on the data authentication in cloud computing and propose a key insulated attribute based signature scheme (KI-ABPS) to provide secure and fine-grained data authentication in the cloud. Our scheme allows...
The article proposes the design of the framework for vehicular ad hoc networks (VANET) for delivery of the authentication keys with minimum delay amongst vehicles having high mobility using fog and cloud computing. We propose to introduce fog computing to extend cloud computing by introducing an intermediate fog layer between mobile devices and cloud thus producing a number of advantages. Since the...
Authentication mechanisms available in existing cloud platforms are inadequate for and poorly-suited to modern cloud-based systems. To support this argument, we describe a variety of authentication mechanisms commonly used in the cloud, and we detail how these mechanisms are actually used in one significant open-source service deployed to a popular cloud platform. We further report on authentication...
Sharing encrypted data with different users via public cloud storage is an important research issue. This paper proposes a key-aggregate authentication cryptosystem. The cryptosystem generates a constant-size key that supports flexible delegation of decryption rights for any set of ciphertexts. The key-size is independent of the number of maximum ciphertexts such that the expense of our scheme is...
Cloud computing provides several benefits to developers, service providers and consumers with respect to scalability, flexibility and availability at inexpensive cost. On the other hand, security is the main concern for cloud computing, particularlyoutsourced data. We focus on a stand-out segment to protectoutsourced of cloud data, which poses various new securitychallenges that need to be addressed...
Radio Frequency Identification (RFID) makes it a supporting technology for the Internet of things (IoT). While RFID has been widely used and developed rapidly, its security and privacy issues cannot be ignored. With the development of cloud computing, cloud based RFID system has become a new solution. Protecting the security of RFID system in cloud environment is particularly important. Not verifying...
Applications offered as Software-as-a-Service should pursue a multi-tenant architecture in order to be profitable. Multi-tenancy helps to reduce the number of application instances by sharing resources amongst several tenants, thus saving operational costs, particularly in public cloud environments. While research mostly discusses how to design green-field software in a multi-tenant manner, this paper...
Cloud data privacy-preserving and integrity verification have become major research areas. Many existing schemes use group signatures to make sure that the data stored in cloud is unbroken for the purpose of privacy and anonymity. However, group signatures do not consider user equality and the framing caused by manager. Therefore, we propose data sharing scheme for non-manager groups, which reconstructs...
Cloud computing has some major limitations that hinder its application to some specific scenarios (e.g., Industrial IoT and remote surgery) where there are particularly stringent requirements, such as extremely low latency. Fog computing is a specialization of the Cloud that promises to overcome the aforementioned limitations by bringing the Cloud closer to end-users. Despite its potential benefits,...
5G, fog computing and the majority of the latest technological trends have minimized latency as a top priority. These initiatives are focusing on physical layer methods to decrease latency, thus keeping the changes transparent to users. Physical layer changes are expensive and in many cases incompatible with the original solution which results in lower adoption rate and higher capital investment....
Currently, Massive Open Online Courses (MOOC) is having significant impact on E-learning by providing free campus curriculum for millions of viewers over the world. Most of MOOC mainly include literal tutorial, video course and easy quiz, but lack of an identical and easily operational experiment environment with durable data. It is crucial for participants to learn complicated courses involved practical...
One of the most predominant technology is the cloud storage that deploys the storage server in public cloud. The security policies that protects and preserves the data integrity may fail due to load and the software stack that runs in various servers in datacenter. The main objective of this paper to controlthe sensitive data managed under IT infrastructure that manage, protect, integrate and extend...
The rapid growth of virtualization in cloud computing has attracted organizations to adopt this technology for its cost-effectiveness, ease of deployment and high availability of resources. Ensuring the security of virtual machine images is a big concern to cloud providers as well as the corporations which own applications and servers in cloud. Industry and academia has conducted extensive research...
Public Administration sector in modern society is characterized by the need to simplify and streamline how to provide services to citizens and business. The enactment of e-government services has been a valuable solution that, thanks to cloud computing, has also ensured greater efficiency, effectiveness, transparency and interoperability. However, such approach creates new challenges for security...
Mobile cloud computing (MCC) is a platform that allows mobile users to offload the computationally rigorous and storage demanding tasks on available cloud resources using wireless access. The major concern with MCC is the privacy of data. Mobile users give confidential information through the network, that if not safeguarded may lead to security issues. Identity Management (IDM) is the management...
With the rapid growth of cloud storage, many users are choosing to store their data in the cloud. It was a challenging problem that how to verify the data integrity of multiple-replica efficiently. Based on B+ tree and bilinear pairing technique, a novel multiple-replica cloud data integrity verification scheme was proposed. In this paper, we introduce the B+ tree authentication structure and design...
Cloud computing is a powerful service that allows the cloud users to utilize the resources located in the cloud servers by pay-per-use or charge-per-use mode through the internet. The cloud users are enjoying the on-demand services provided by the cloud computing environment without maintaining the data in a local system. Even though the service is offered to cloud users in an efficient way, there...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.