Hiremath et al., 2017 - Google Patents
A novel data auditing approach to achieve data privacy and data integrity in cloud computingHiremath et al., 2017
- Document ID
- 1760121196003286239
- Author
- Hiremath S
- Kunte S
- Publication year
- Publication venue
- 2017 international conference on electrical, electronics, communication, computer, and optimization techniques (ICEECCOT)
External Links
Snippet
Cloud computing is a general term for the delivery of hosted services over the internet. Using the cloud services saves both users time and money. However, there are some security issues to be solved for personal users and enterprises to store data in the cloud. The fact is …
- 238000000034 method 0 abstract description 10
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hiremath et al. | A novel data auditing approach to achieve data privacy and data integrity in cloud computing | |
| More et al. | Third party public auditing scheme for cloud storage | |
| US8185942B2 (en) | Client-server opaque token passing apparatus and method | |
| US20220014367A1 (en) | Decentralized computing systems and methods for performing actions using stored private data | |
| El-Booz et al. | A secure cloud storage system combining time-based one-time password and automatic blocker protocol | |
| CN114244508A (en) | Data encryption method, device, equipment and storage medium | |
| Nirmala et al. | Data confidentiality and integrity verification using user authenticator scheme in cloud | |
| Bhargav et al. | A review on cryptography in cloud computing | |
| GB2529633A (en) | Password-based generation and management of secret cryptographic keys | |
| Junghanns et al. | Engineering of secure multi-cloud storage | |
| Khan et al. | SSM: Secure-Split-Merge data distribution in cloud infrastructure | |
| Kumar | A novel privacy preserving HMAC algorithm based on homomorphic encryption and auditing for cloud | |
| CN117499160A (en) | Network security protection method and system based on electronic file | |
| Agarkhed et al. | An efficient auditing scheme for data storage security in cloud | |
| More et al. | Secure and efficient public auditing scheme for cloud storage | |
| Jabbar et al. | Design and implementation of hybrid EC-RSA security algorithm based on TPA for cloud storage | |
| Navajothi et al. | An efficient, dynamic, privacy preserving public auditing method on untrusted cloud storage | |
| Adokshaja et al. | Third party public auditing on cloud storage using the cryptographic algorithm | |
| Hiremath et al. | Ensuring cloud data security using public auditing with privacy preserving | |
| Kamboj et al. | DEDUP: Deduplication system for encrypted data in cloud | |
| Shah et al. | Third party public auditing scheme for security in cloud storage | |
| Patil et al. | Efficient privacy preserving and dynamic public auditing for storage cloud | |
| Singh et al. | Data Integrity Check in Cloud Computing using Hash Function. | |
| Reddy et al. | Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques | |
| Agme et al. | Cloud data storage security enhancement using identity based encryption |