Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In cloud computing, it is important to have instant access of resources such as CPU, storage and data. Key management techniques are used to protect the access of resources. In recent years, there is an increase use of threshold cryptography in Cloud computing. In threshold cryptography (k,n), k shares out of n can be used to form the key. Key share management is important in threshold cryptography...
Dynamic Proof of Storage (PoS) is a useful cryptographic primitive that enables a user to check the integrity of outsourced files and to efficiently update the files in a cloud server. Although researchers have proposed many dynamic PoS schemes in single-user environments, the problem in multi-user environments has not been investigated sufficiently. A practical multi-user cloud storage system needs...
A cheating detectable secret sharing scheme is a secret sharing scheme that can detect forged shares in reconstructing a secret. For example, if we store shares in cloud storage, there is a possibility of it being forged. If the administrators of cloud storage are malicious, it is easy for them to forge a share. Therefore, cheating detectable secret sharing schemes have attracted attention, and many...
Due to the rapid growth of information acquisition in the era of the Internet of Things (IoT) and Cloud Computing, the concern about the security of private information raises a lot of interests. This paper investigates image sharing based on the concept of (k, n)-threshold strategy according to the Chinese remainder theorem (CRT). A secret image is distributed into n noise-like shadow images preserved...
Cloud computing being promising and emerging technology for the next generation of IT applications which provides the storage and supports for outsourcing of data without having the native copy of data or files. Cloud computing service providers require a system which can handle a large number of requests at a time and is needed to be highly available. Major issue faces in cloud computing is Security...
Benefited from cloud storage services, users can save their cost of buying expensive storage servers. Meanwhile they lost the physical control of their data. So effective methods are needed to verify the correctness of the data stored in cloud servers, which are the research issues the provable data possession (PDP) faces. This paper analyzes the existing PDP algorithms, finds some defects of these...
As cloud computation becomes mainstream, the need to ensure the privacy of the data entrusted to third parties keeps raising. But the actual computation inside cloud microprocessors remains unencrypted. Thus, the opportunity of leakage is theoretically possible. Therefore, to address the challenge of protecting the computation inside the microprocessor, we introduce novel general purpose architecture...
Cloud computing is based on network and computer applications. In cloud data sharing is an important activity. Small, medium, and big organization are use cloud to store their data in minimum rental cost. In present cloud proof their importance in term of resource and network sharing, application sharing and data storage utility. Hence, most of customers want to use cloud facilities and services....
Mobile devices are now very popular in many applications, and there is a trend to use them in statistic surveys. The main technical issue is privacy assurance. In this paper, we propose a certification-based approach for privacy assurance in multiple transactions of a survey conducted by a third-party application (TPA), which wants to find the maximal values of private data of some member groups in...
Cloud computing encourages the prototype for data service outsourcing, where data owners can avoid cost usage by storing their data in cloud storage centers. The ultimate problem of cloud computing technology is that, the service providers have to protect the user data and services. Secured systems should consider Confidentiality, Availability and Integrity as their primary option. The user encrypts...
Data security has become a major subject in the cloud computing. Data integrity verification allows clients know whether the data storing in the cloud is secure or not. And data recovery also provides a reliable guarantee for the clients. However, the pre-processing for the files such as the works of hash, blocks' signature, and redundancy generation and data recovery causes a great challenge to the...
Dropbox, a popular cloud storage provider, pose several threats especially in terms of file security and unauthorized access. An Android and a web application which implemented Serpent cryptographic algorithm and One-Time Password (OTP) mechanism to secure files on Dropbox and a web application was built as a solution by utilizing Dropbox Application Programming Interface (API) and Bouncy Castle library...
Built on the fundamental concepts of grid, cluster & distributed computing and following the evolution from mainframe computers to client/server models, Cloud computing is a novel paradigm where computing resources are provisioned on demand. By outsourcing computing and storage requirements to Cloud, user enjoys numerous benefits, such as cost saving through pay for you use model, flexibility...
Cloud computing is now the hot spot of computer business and research. However cloud computing security issues have become more and more pronounced. To protect data confidentiality and integrity, making more reliable in cloud computing becomes priorities. Cloud computing security related to the survival of cloud computing, has become a key factor in the development of cloud computing. This paper presents...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.