The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Providing security to the stored data on the cloud is one of the important challenges in cloud computing. Encrypted data which is stored on the cloud may be viewed or modified by the cloud service provider. To overcome this problem many techniques have been developed but, those cannot guarantee accurately about the security of the stored data. These modifications of the data by the service provider...
Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether their outsourced data is kept intact without downloading the whole data. In some application scenarios, the clients have to store their data on multicloud servers. At the same time, the integrity checking protocol must be efficient in order to save the verifier's cost. From the two points,...
In today's “era of Tera”, everything is possible in terms of storage and service. The long-held dream of computing as a utility has been achieved in the form of cloud computing. It has transformed the world where large part of IT industry is simplified by Platform as a Service, Software's are developed and rented more attractively in the form of Development as a Service, Software as a Service. It...
In privacy-preserving data mining, a number of parties would like to jointly learn a function of their private data sets in a way that no information about their inputs, beyond the output itself, is revealed as a result of such computation. Yang et al. 2010 showed that several popular data mining algorithms can be reduced to three basic operations, secure implementation of which -- termed Secure Product...
Cloud computing represents a new IT model for consumption and delivery of the services over the Internet. Cloud computing is a natural evolution of the widespread adoption of virtualization, service-oriented architecture and utility computing.
For purpose of managing network security policy duly and flexibly in the complex network environment, and resolving its issue efficiency, this paper proposes network security policy self-adaptive management and distribution model. An incident triggered, policy-driven and self-adaptive management mechanism is established, and the impact of safety equipment or user requests, such as system resources...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.