The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this invited paper, we propose HealthShare - a forward-looking approach for secure ehealth data sharing between multiple organizations that are hosting patients data in different clouds. The proposed protocol is based on a Revocable Key-Policy Attribute-Based Encryption scheme and allows users to share encrypted health records based on a policy that has been defined by the data owner (i.e. patient,...
Cloud virtualization technology is shifting towards light-weight containers, which provide isolated environments for running cloud-based services. The emerging trends such as container-based micro-service architectures and hybrid cloud deployments result in increased traffic volumes between the micro-services, mobility of the communication endpoints, and some of the communication taking place over...
Data Deduplication provides lots of benefits to security and privacy issues which can arise as user's sensitive data at risk of within and out of doors attacks. Traditional secret writing that provides knowledge confidentiality is incompatible with knowledge deduplication. Ancient secret writing wants completely different users to encode their knowledge with their own keys. Thus, identical knowledge...
Cloud computing is a growing technology that offers compute, storage and network resources as a service over the internet. It enables the individuals, clients or the enterprises to outsource their data and application software to the cloud server. The services are offered by a cloud service provider (CSP) and the users need to pay for what they use. There are many security concerns needs to be addressed...
In recent years, the electronic medical records can be easily stored with the rapid development of healthcare technology and cloud computing. However, the patient's medical information security is currently concern issue. Despite of many literatures discussed about it, these literatures still face many security challenges. Therefore, we propose an authentication scheme based on cloud environment....
Nowadays, offloading storage and processing capacity to cloud servers is a growing trend. This happens because high storage capacity and powerful processors are expensive, whilst cloud services provide a cheaper, ongoing, and reliable solution. The problem with cloud-based solutions is that servers are highly accessible through the Internet and therefore considerably exposed to hackers and malware...
In this paper, we propose a two-factor data security protection mechanism with factor revocability for cloud storage system. Our system allows a sender to send an encrypted message to a receiver through a cloud storage server. The sender only needs to know the identity of the receiver but no other information (such as its public key or its certificate). The receiver needs to possess two things in...
The cloud computing environment enables cloud users to outsource their data into the cloud environment because of its cost efficiency and ease of management. However, by out sourcing the data to the cloud, cloud users lose their control over the data. This situation becomes more critical when using a cell phone and initiating the handoff process. There is a problem when cloud users invalidate some...
21st century is often called the Information Century. Information technology is being used in all areas of life from medicine to astronomy. The list of developments and advances happened in those areas thanks to information technology penetration is endless. As the world become digitized more and more and information technology becomes ubiquitous, creating electronic and digital phenomena such as...
The prospect of outsourcing an increasing amount of data to a third party and the abstract nature of the cloud promote the proliferation of security and privacy challenges, namely, the remote data possession checking. This paper addresses this security concern, while supporting the verification of several data blocks outsourced across multiple storing nodes. We propose a new set homomorphic proof...
Nowadays cloud computing is widely used by users and organization to get benefit of many services in cloud. Huge datasets in cloud persuade users to outsource their information and documents to the untrusted Cloud Service Provider (CSP). On the other hand, there are some privacy and security problems in cloud storage considering as main drawbacks of extending it among users. One of the solutions for...
In this paper, we describe a scheme that enables patients to exercise complete control over their personal health records (PHR) stored in the cloud whilst also maintaining confidentiality of their data. The design goals of the proposed scheme include: (1) confidentiality of health data, (2) integrity of health data, (3) authenticity of health data, (4) patient-centric fine-grained access control,...
In this paper, we address several critical security issues that bottle up the wide adoption of the Cloud Computing technology. In the last years the Cloud Security Alliance (CSA) has identified many security issues that should be considered during the design of Cloud systems. We experienced them developing the Security-Enhanced (SE) CLEVER, the secure release of CLEVER, a Message Oriented Middleware...
As any new technology advancement, cloud computing also creates disruptive possibilities and security risk potentials. Virtualization which are the engine that drives cloud computing turns the data center into self-managing, highly scalable, highly available and pools of easily consumable resources. The increase in virtualization and usage of virtual machines (VM) in cloud computing environment has...
Software as a Service (SaaS) provides a useful and convenient way for cloud users to enjoy cloud service, but security problems have caused great influence on the development and popularization of SaaS. As a commercial model, SaaS involves different roles of participants who could be dishonest and malicious. This paper presents a security protocol to address several security issues in SaaS and protect...
This paper describes a cryptographic protocol for storing and processing data in a Cloud Computing setting, where users need not place absolute trust in the various Cloud Processing providers. This is achieved by distributing data among various Cloud Storage providers in such a manner that an individual data item does not divulge useful information about its owner, and only re-assembling data when...
Data security and access control is one of the most challenging ongoing research work in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.