The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things has been widely applied in everyday life, ranging from transportation, healthcare, to smart homes. As most IoT devices carry constrained resources and limited storage capacity, sensing data need to be transmitted to and stored at resource-rich platforms, such as a cloud. IoT applications retrieve sensing data from the cloud for analysis and decision-making purposes. Ensuring the...
In this paper we study how to develop an efficient real-time auditing and proof of violation (POV) scheme for cloud storage systems. A POV scheme enables a user or a service provider to produce cryptographic proofs which can be used to prove either the occurrence of the violation of properties or the innocence of the service provider. POV schemes are solutions for obtaining mutual nonrepudiation between...
Cloud storage is getting popular as it offers flexible service with appealing benefits of on-demand data outsourcing. Putting away files remotely instead of locally boasts an array of preferences for both home and professional clients. In this paper we are trying to secure all kind of private data into cloud by providing some security levels which includes encryption, digital signature and visual...
Cloud computing is getting more popular in the field of computer science because of its reliability in storing and assessing data remotely. In the presence scenario it is very biter to have mobile devices as an interface between user and server, to access and store data for one's need. Mobile technology in cloud computing is helps users to operate on the data for any of the application for their organization...
In spite of a legal framework having been in place for many years now, the market share of qualified electronic signatures is still low. New designs are desperately needed for qualified electronic signature to flourish. Cloud computing provides a new and promising opportunity for delivering electronic signatures as a service. This paper covers the challenges in implementing a cloud-based digital signature...
Cloud security represents a main hindrance that causes to retard its widespread adoption. Authentication considers a significance element of security in cloud environment, aiming to verify a user's identity when a user wishes to request services from cloud. There are many authentication schemes that depend on username/password, but they are considered weak techniques of cloud authentication. A more...
Cloud computing is gaining tremendous momentum in both academia and industry, with more and more people and enterprises migrating their data and applications into the cloud. Cloud computing provides a new computing model with elastic scaling, a resource pool of unprecedented size, and the on-demand resource provisioning mechanism, which bring numerous challenges in implementing workflow management...
The cloud is a next generation platform that provides dynamic resource pools, virtualization, and high availability. Today, we have the ability to utilize scalable, distributed computing environments within the confines of the Internet, a practice known as cloud computing. Cloud computing is the Concept Implemented to decipher the Daily Computing Problems, likes of Hardware Software and Resource Availability...
The integrality and security of data transfer are very important issues in cloud computing. In this paper, we have review a digital signature scheme with fault tolerance based on the RSA cryptosystem proposed by Zhang in 1999. The proposed scheme can efficiently keep the confidentiality of the transferred message. Furthermore, the scheme is able to detect and correct the error occurring in the computation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.