Academic literature on the topic 'CLOUD OF SECRECY'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'CLOUD OF SECRECY.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "CLOUD OF SECRECY"
Gosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh, and Prof A. A. Pund. "Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (June 30, 2023): 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.
Full textAnjaneyulu, GSGN, Yogendra Singh Sisodiya, and Kumar Saurav. "Novel Composite Encryption for Secrecy in Cloud Computing." Research Journal of Pharmacy and Technology 9, no. 9 (2016): 1501. http://dx.doi.org/10.5958/0974-360x.2016.00292.4.
Full textRajkumar, N., and E. Kannan. "Attribute-Based Collusion Resistance in Group-Based Cloud Data Sharing using LKH Model." Journal of Circuits, Systems and Computers 29, no. 02 (May 9, 2019): 2030001. http://dx.doi.org/10.1142/s0218126620300019.
Full textK, Sudha, and Dr Umarani C. "Security Framework for Cloud Information under Transparency of a Key." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 1429–36. http://dx.doi.org/10.22214/ijraset.2022.41550.
Full textPark, Junyoung, and Eui-Nam Huh. "eCLASS: Edge-Cloud-Log Assuring-Secrecy Scheme for Digital Forensics." Symmetry 11, no. 10 (September 22, 2019): 1192. http://dx.doi.org/10.3390/sym11101192.
Full textNagaraju, Dr Sabout, S. K. V. Jayakumar, and C. Swetha Priya. "Efficient Multi-linear Key Pairing Cryptosystem for Reliable Cloud-based Service Provisioning." Revista Gestão Inovação e Tecnologias 11, no. 4 (August 13, 2021): 4440–55. http://dx.doi.org/10.47059/revistageintec.v11i4.2471.
Full textKhan, Yunus, and Sunita Verma. "An Intelligent Blockchain and Software-Defined Networking-Based Evidence Collection Architecture for Cloud Environment." Scientific Programming 2021 (September 29, 2021): 1–19. http://dx.doi.org/10.1155/2021/7294206.
Full textAgarkhed, Jayashree, and R. Ashalatha. "Data Privacy and Security in Cloud Environment Using Cryptography Approach." Asian Journal of Computer Science and Technology 7, no. 1 (May 5, 2018): 50–54. http://dx.doi.org/10.51983/ajcst-2018.7.1.1830.
Full textQin, Bo, Huaqun Wang, Qianhong Wu, Jianwei Liu, and Josep Domingo-Ferrer. "Simultaneous authentication and secrecy in identity-based data upload to cloud." Cluster Computing 16, no. 4 (April 23, 2013): 845–59. http://dx.doi.org/10.1007/s10586-013-0258-7.
Full textSrilakshmi, K., and P. Bhargavi. "Cloud Computing Security Using Cryptographic Algorithms." Asian Journal of Computer Science and Technology 8, S3 (June 5, 2019): 76–80. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2082.
Full textDissertations / Theses on the topic "CLOUD OF SECRECY"
Cornejo-Ramirez, Mario. "Security for the cloud." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE049/document.
Full textCryptography has been a key factor in enabling services and products trading over the Internet. Cloud computing has expanded this revolution and it has become a highly demanded service or utility due to the advantages of high computing power, cheap cost of services, high performance, scalability, accessibility as well as availability. Along with the rise of new businesses, protocols for secure computation have as well emerged. The goal of this thesis is to contribute in the direction of securing existing Internet protocols by providing an analysis of the sources of randomness of these protocols and to introduce better protocols for cloud computing environments. We propose new constructions, improving the efficiency of current solutions in order to make them more accessible and practical. We provide a detailed security analysis for each scheme under reasonable assumptions. We study the security in a cloud computing environment in different levels. On one hand, we formalize a framework to study some popular real-life pseudorandom number generators used in almost every cryptographic application. On the other, we propose two efficient applications for cloud computing. The first allows a user to publicly share its high-entropy secret across different servers and to later recover it by interacting with some of these servers using only his password without requiring any authenticated data. The second, allows a client to securely outsource to a server an encrypted database that can be searched and modified later
ALSHIDDI, REEM SAAD. "THE IMPLEMENTATION OF SOCIAL SECRET SHARING IN CLOUD COMPUTING." OpenSIUC, 2015. https://opensiuc.lib.siu.edu/theses/1626.
Full textAttasena, Varunya. "Secret sharing approaches for secure data warehousing and on-line analysis in the cloud." Thesis, Lyon 2, 2015. http://www.theses.fr/2015LYO22014/document.
Full textCloud business intelligence is an increasingly popular solution to deliver decision support capabilities via elastic, pay-per-use resources. However, data security issues are one of the top concerns when dealing with sensitive data. Many security issues are raised by data storage in a public cloud, including data privacy, data availability, data integrity, data backup and recovery, and data transfer safety. Moreover, security risks may come from both cloud service providers and intruders, while cloud data warehouses should be both highly protected and effectively refreshed and analyzed through on-line analysis processing. Hence, users seek secure data warehouses at the lowest possible storage and access costs within the pay-as-you-go paradigm.In this thesis, we propose two novel approaches for securing cloud data warehouses by base-p verifiable secret sharing (bpVSS) and flexible verifiable secret sharing (fVSS), respectively. Secret sharing encrypts and distributes data over several cloud service providers, thus enforcing data privacy and availability. bpVSS and fVSS address five shortcomings in existing secret sharing-based approaches. First, they allow on-line analysis processing. Second, they enforce data integrity with the help of both inner and outer signatures. Third, they help users minimize the cost of cloud warehousing by limiting global share volume. Moreover, fVSS balances the load among service providers with respect to their pricing policies. Fourth, fVSS improves secret sharing security by imposing a new constraint: no cloud service provide group can hold enough shares to reconstruct or break the secret. Five, fVSS allows refreshing the data warehouse even when some service providers fail. To evaluate bpVSS' and fVSS' efficiency, we theoretically study the factors that impact our approaches with respect to security, complexity and monetary cost in the pay-as-you-go paradigm. Moreover, we also validate the relevance of our approaches experimentally with the Star Schema Benchmark and demonstrate its superiority to related, existing methods
Wasim, Muhammad Umer <1979>. "Design and Implementation of Legal Protection for Trade Secrets in Cloud Brokerage Architectures relying on Blockchains." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amsdottorato.unibo.it/8294/1/WASIM_MUHAMMAD%20UMER__tesi.pdf.
Full textFramner, Erik. "A Configuration User Interface for Multi-Cloud Storage Based on Secret Sharing : An Exploratory Design Study." Thesis, Karlstads universitet, Handelshögskolan (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-71354.
Full textPRISMACLOUD
Adeka, Muhammad I. "Cryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trust." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/11380.
Full textWang, Zhaohong. "Information-Theoretic Secure Outsourced Computation in Distributed Systems." UKnowledge, 2016. http://uknowledge.uky.edu/ece_etds/88.
Full textCHENG, JUI-JUNG, and 鄭瑞榮. "A Study of Reasonable Measures to Maintain Secrecy in Trade Secret Law-Towards Cloud Computing." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/2u7b5d.
Full text世新大學
智慧財產權研究所(含碩專班)
104
“The owners have taken reasonable measures to maintain confidentiality” means trade secrets owners objectively take certain behaviors, and let others know that they have intents to protect these information as secrets. There are no legal regulations to decide that whether the measures taken by trade secrets owners are achieved “reasonable” degree or not. It is usually judged by kinds and nature of cases. Although experts and scholars propose specific measures to define that what reasonable measures taken for maintain confidentiality are, they lack of complete thinking and structure. Take possible four stages of business secrets losses summarized by the “Institute for Information Industry”: 1. internal operation; 2. external negotiation; 3. external negotiation afterwards; 4. during dispute process for example, we can learn it form them that what completely reasonable maintain confidentiality are. In addition to traditionally protecting facilities and signing “confidentiality agreements” for protecting business trade secrets, some preventive and remedial reasonable measures include to sign “non-compete agreements” and claim for “confidentiality protective orders,” and so on. At present, enterprises often use cloud computing to storage business secrets, so this thesis attempts to study legal risks of trade secrets losses resulting from insufficient protections of cloud service providers. This study also makes suggestions for research results for enterprises to establish completely reasonable maintain secrets measures and give references to the relevant government agencies. Keyword︰ trade secret, reasonable maintain secrets measures,confidentiality agreements,non-compete agreements,confidentiality protective orders,cloud computing
Li, Jian-Ming, and 李堅銘. "Secret Image Sharing over Distributed Cloud Network." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/j62pu2.
Full text國立東華大學
資訊工程學系
106
In 1979, Shamir published a landmark paper that a (k, n)-Secret Sharing (SS) hiding a secret data in the constant term of a (k-1)-degree polynomial. Accordingly, by using Shamir’s (k, n)-SS, Thien and Lin extended SS to share digital images. This secret image sharing (SIS) scheme is an important research area combining methods and techniques coming from cryptography and image processing. In (k, n)-SIS scheme a secret image is subdivided into n shadow images (referred to as shadows). By using any k or more than k shadows, the secret image can be recovered. However, any (k-1) or fewer than (k-1) shares cannot obtain any secret information. Up to date, there are many SIS schemes with specific features, e.g., providing authentication, progressive reconstruction, meaningful shadows, sharing multiple secrets. In addition, the SIS schemes with specific thresholds, (t, s, k, n)-SIS scheme and (t, k, n)-SIS scheme, were also studied. Due to the fast growth of cloud network, users may outsource their data to cloud servers. However, the major concern is that the security and privacy should be assured from outsiders, other clients, or even the unauthorized cloud employees. In this thesis, we study the public reconstruction of (k, n)-SIS scheme over distributed cloud network (DCN). In fact, all previous (k, n)-SIS schemes do not deal with public reconstruction of SIS scheme over DCN. Obviously, to enable secure reconstruction over DCN, we need secure communication among all involved participants holding shadows. A naive implementation of secure communication is using an extra key management protocol to deliver a common key to all participants. In this thesis, we use multi-variate symmetric polynomial to obtain public reconstruction of SIS scheme over DCN (SISDCN), which still has the threshold property (recover the secret image from any k shadows) and meanwhile provides secure reconstruction over DCN. Our SISDCN may noninteractively share a common key that establish secure communication among any k participants.
Lin, Cheng-Ting, and 林正庭. "A Secret-Sharing-Based Method for Cloud Storage System." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/69726621877613632163.
Full text國立中山大學
資訊工程學系研究所
104
In recent years, at an era of information explosion, cloud storage system is wide-spread used in our daily life. However, cloud storage system include many information security issues. The technical of secret sharing is applied to solve these problem include data privacy, data integrity and computational cost. Nevertheless, applying Shamir’s secret sharing scheme to cloud storage system, there are two fetal problems. When we upload the file to the cloud storage system, the size of each share equals to the file such that it waste amount of storage to save these shares; furthermore, a heavy computational cost is required to make shares which is going to be saved in the cloud servers. Therefore, we then proposed a secret-sharing-based method by generating pseudo-random number to replace the real shares such that it reduces the storage cost; in addition, we use just EXCLUSIVE-OR (XOR) operation to reduce the computational cost when computing the shares for each cloud servers.
Books on the topic "CLOUD OF SECRECY"
Dreece, Adam. The man of cloud 9. Calgary: ADZO Publishing Inc., 2016.
Find full textSauveur, Paula. La protection du secret commercial dans les nuages publics de l'infonuagique (cloud computing). Cowansville, Québec: Éditions Y. Blais, 2013.
Find full textKetchup clouds. Bath: Galaxy, 2013.
Find full textOnce the clouds have gone. Valley Falls, NY: Bold Strokes Books, 2014.
Find full textKetchup clouds: A novel. New York: Little, Brown and Company, 2013.
Find full textYun de ao mi: Taiwan pian : Secrets of the cloud II. Taibei Xian Xindian Shi: Ren ren, 2002.
Find full textCole, Leonard A. Clouds of secrecy: The army's germ warfare tests over populated areas. Totowa, N.J: Rowman & Littlefield, 1988.
Find full textCole, Leonard A. Clouds of secrecy: The army's germ warfare tests over populated areas. Savage, Md: Rowman & Littlefield, 1990.
Find full textCole, Leonard A. Clouds of Secrecy: The Army's Germ Warfare Tests Over Populated Areas. Totowa, N.J: Rowman & Littlefield, 1988.
Find full textCole, Leonard A. Clouds of secrecy: The army's germ warfare tests over populated areas. London: Rowman & Littlefield, 1990.
Find full textBook chapters on the topic "CLOUD OF SECRECY"
Patgiri, Ripon, Malaya Dutta Borah, and Laiphrakpam Dolendro Singh. "Data Secrecy: Why Does It Matter in the Cloud Computing Paradigm?" In Modeling, Simulation and Optimization, 549–60. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0836-1_42.
Full textGopika, L., V. K. Kavitha, B. Radhakrishnan, and Padma Suresh Lekshmi Kanthan. "Secure Data Sharing in Multiple Cloud Servers Using Forward and Backward Secrecy." In Soft Computing Systems, 335–42. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1936-5_36.
Full textSeele, Peter, and Lucas Zapf. "Conclusion: Our Secrets Behind the Cloud." In Behind the Cloud, 175–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64502-4_6.
Full textSeele, Peter, and Lucas Zapf. "Outlook: Digital Authenticity: Immersive Consumption Without Secrets." In Behind the Cloud, 185–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64502-4_7.
Full textGarbarino, Ernesto. "ConfigMap and Secrets." In Beginning Kubernetes on the Google Cloud Platform, 155–90. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5491-2_5.
Full textWang, Ming-Ming, Zhi-Guo Qu, and Mohamed Elhoseny. "Quantum Secret Sharing in Noisy Environment." In Cloud Computing and Security, 100–112. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68542-7_9.
Full textDolev, Shlomi, and Yin Li. "Secret Shared Random Access Machine." In Algorithmic Aspects of Cloud Computing, 19–34. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29919-8_2.
Full textSeele, Peter, and Lucas Zapf. "Summary: Thoughts in a Digital World: Free, but no Longer Secret." In Behind the Cloud, 169–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64502-4_5.
Full textHofheinz, Dennis, and Eike Kiltz. "Scalable Cryptography." In Lecture Notes in Computer Science, 169–78. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-21534-6_9.
Full textWang, Ming-Ming, Lu-Ting Tian, and Zhi-Guo Qu. "Efficient Multiparty Quantum Secret Sharing Scheme in High-Dimensional System." In Cloud Computing and Security, 23–31. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00012-7_3.
Full textConference papers on the topic "CLOUD OF SECRECY"
Manohar, S., Manohar Vignesh, and Gabrielle Margaret Prabhu. "Sensitive Data Transaction Using RDS in AWS." In International Research Conference on IOT, Cloud and Data Science. Switzerland: Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-3z1665.
Full textReddy P., Muthi, Rekha Rangappa Dasar, R. Tanuja, S. H. Manjula, and K. R. Venugopal. "Forward Secrecy in Authentic and Anonymous Cloud with Time Optimization." In 2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN). IEEE, 2018. http://dx.doi.org/10.1109/wocn.2018.8556130.
Full textOgiela, Marek R., Lidia Ogiela, and Urszula Ogiela. "Intelligent Bio-inspired Approach for Secrecy Management in the Cloud." In 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC). IEEE, 2014. http://dx.doi.org/10.1109/3pgcic.2014.78.
Full textMarina, Ninoslav, Natasha Paunkoska, and Aneta Velkoska. "Improved bounds on secrecy capacity in twin-code cloud storage framework." In 2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2016. http://dx.doi.org/10.1109/icumt.2016.7765384.
Full textYoo, Seungmin, Jeongwan Koh, Donggu Kim, and Joonhyuk Kang. "Cloud and Edge Processing by Precoder Design for Secrecy Rate Maximization." In 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, 2019. http://dx.doi.org/10.1109/ccnc.2019.8651780.
Full textPatgiri, Ripon, Malaya Dutta Borah, and Laiphrakpam Dolendro Singh. "SecretStore: A Secrecy as a Service model to enable the Cloud Storage to store user's secret data." In 2021 26th IEEE Asia-Pacific Conference on Communications (APCC). IEEE, 2021. http://dx.doi.org/10.1109/apcc49754.2021.9609895.
Full textWang, Li, Tenghui Ke, Mei Song, Yifei Wei, and Yinglei Teng. "Research on secrecy capacity oriented relay selection for mobile cooperative networks." In 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS). IEEE, 2011. http://dx.doi.org/10.1109/ccis.2011.6045106.
Full textXiao, Chen, Zhu Yan, Yin Xinxing, Li Fangbiao, Xue Zhi, Zhou Yongkai, and Pang Liang. "Research on the Vulnerability of MIMO Secrecy using AN Matrix Blind Space Elimination." In 1st International Workshop on Cloud Computing and Information Security. Paris, France: Atlantis Press, 2013. http://dx.doi.org/10.2991/ccis-13.2013.117.
Full textYan, Zhu, Chen Xiao, Zhou Yongkai, Li Fangbiao, Pang Liang, Yin Xinxing, and Xue Zhi. "Research on the Secrecy Achievable Rate Region for the Broadcast channel with eavesdropper." In 1st International Workshop on Cloud Computing and Information Security. Paris, France: Atlantis Press, 2013. http://dx.doi.org/10.2991/ccis-13.2013.19.
Full textKumar, Naveen, Anish Mathuria, and Manik Lal Das. "Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System." In 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2015. http://dx.doi.org/10.1109/trustcom.2015.513.
Full text