Milkkal et al., 2013 - Google Patents
Sheltered Data Storage Services in Cloud ComputingMilkkal et al., 2013
View PDF- Document ID
- 5325961021795423522
- Author
- Milkkal B
- Deny J
- Krishna Ranjana M
- Sundaramaheswari V
- Publication year
- Publication venue
- International Journal of Electronics Communication and Computer Engineering
External Links
Snippet
Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical …
- 238000003860 storage 0 title abstract description 72
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Wang et al. | Toward secure and dependable storage services in cloud computing | |
| Chen | Using algebraic signatures to check data possession in cloud storage | |
| Syam Kumar et al. | An efficient and secure protocol for ensuring data storage security in cloud computing | |
| Azraoui et al. | Stealthguard: Proofs of retrievability with hidden watchdogs | |
| Nithiavathy | Data integrity and data dynamics with secure storage service in cloud | |
| Rampal Singh et al. | Ensuring data storage security in cloud computing | |
| Chen et al. | Enabling data integrity protection in regenerating-coding-based cloud storage | |
| Kumar et al. | Ensuring data integrity in cloud computing | |
| Kumar et al. | Ensuring data storage security in cloud computing using Sobol Sequence | |
| Huang et al. | Enabling dynamic proof of retrievability in regenerating-coding-based cloud storage | |
| VS et al. | A secure regenerating code‐based cloud storage with efficient integrity verification | |
| Ahmed et al. | Lightweight secure storage model with fault-tolerance in cloud environment | |
| Milkkal et al. | Sheltered Data Storage Services in Cloud Computing | |
| Albeshri et al. | A security architecture for cloud storage combining proofs of retrievability and fairness | |
| Chen | Using algebraic signatures for remote data possession checking | |
| Abraham et al. | Proving possession and retrievability within a cloud environment: A comparative survey | |
| Reddy et al. | Secure Storage Services and Erasure Code Implementation in Cloud Servers | |
| Jaikar et al. | Verifying Data Integrity in Cloud | |
| Gunjal et al. | Data Security And Integrity Of Cloud Storage In Cloud Computing | |
| Shrividhya et al. | Erasure correcting to enhance data security in cloud data storage | |
| Rohini | Comparative approach to cloud security models | |
| Ujloomwale et al. | Data storage security in Cloud | |
| Anusha et al. | Storage Correctness and Dynamic Data Support For Cloud Data | |
| Mary et al. | Efficacious applicability of foolproof security and reliable storage services in cloud computing | |
| Sun et al. | MB-DDIVR: A map-based dynamic data integrity verification and recovery scheme in cloud storage |