The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As a promising cryptographic primitive, attributebased encryption (ABE) is adopted to protect outsourced data. However, there are some issues in existing attribute-based encryption schemes. First, the attribute authority manages attributes of users, so it may cause the leakage of users' privacy information. Second, because the access structures are directed along with the ciphertexts and may violate...
Big data has become a hot topic in many areas where the volume and growth rate of data require cloud-based platforms for processing and analysis. Due to open cloud environments with very limited user-side control, existing research suggests encrypting data before outsourcing and adopting Searchable Symmetric Encryption (SSE) to facilitate keyword-based searches on the ciphertexts. However, no prior...
This paper explores secure data processing in hybrid clouds wherein local computing capability is exploited alongside public cloud services to deliver an efficient and secure data management solution. Hybrid clouds offer numerous advantages including the ability to selectively outsource data and computations based on sensitivity/confidentiality. Data processing in hybrid clouds must address two interrelated...
In the present cloud computing paradigm, with each business moving to the cloud computing, ithas become mandatory that the data be moved to the publiccloud environment and managing the same without anysecurity breach. The main problem was privacy notmaintain to secure access the data in local and public cloudstorage, and another problem not securely to searchingthe encrypted data in biggest cloud...
Encryption will play a more important role as more computation and storage are outsourced. Achieving good balance between strong security and application functionality preservation becomes a cutting-edge research problem. SE algorithms are well studied, which delegate search capabilities to the cloud provider without decrypting the documents. But this approach imposes extra constraints on cloud API...
An important problem when moving an application to the cloud consists in selecting the most suitable cloud plan (among those available from cloud providers) for the application deployment, with the goal of finding the best match between application requirements and plan characteristics. If a user wishes to move multiple applications at the same time, this task can be complicated by the fact that different...
Enterprise cloud tenants would store their outsourced cloud data in encrypted form for data privacy and security. However, flexible data access functions such as data searching is usually sacrificed as a result. Thus, enterprise tenants demand secure data retrieval and computation solution from the cloud provider, which will allow them to utilize cloud services without the risks of leaking private...
Cloud computing is presently one of the key technologies for most IT applications. However, it frequently suffers from various security threats on data retrieval from cloud storage due to the sharing of resources in the public domain. Though several attempts have been made to address those concerns by cloud service providers, they are either too complicated or too costly to implement in order to obtain...
Data Outsourcing has evolved rapidly with the advent of cloud computing wherein third parties provide storage services. Insider attacks still continue to haunt cloud users as they tend to cause unprecedented damage, especially when privileged users who have access to sensitive information go rogue. Many proposals have been made to Secure the Cloud from Insider threat Attacks and most of the standard...
Since there is significant increase in adoption of cloud computing, securing users emails is also a growing concern. This paper reviews the boundaries, privacy, vulnerabilities, varying legislations of cloud based emails, and how to mitigate such to provide reliable and secure cloud based email services for users and organizations. We propose a new framework to improve security of cloud based email...
Cloud Storage systems provide user a safe and consistent place to save user's valuable data and documents. However, user's files are not encrypted on some open source cloud storage systems, such as Hadoop and Sector. The storage service provider can easily access the user's files. This brings a big concern about user's privacy. This paper describes a cloud storage system named YI Cloud. This system...
Cloud computing delivery model can significantly reduce enterprise IT costs and complexities. This technology can handle the rapidly gowning environment and provide more flexible resources sharing and hence it has become as anew information technology infrastructure recently. In contrast to traditional enterprise IT solution, cloud computing moves the application software and databases to the servers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.