Littérature scientifique sur le sujet « CLOUD OF SECRECY »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « CLOUD OF SECRECY ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "CLOUD OF SECRECY"
Gosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh et Prof A. A. Pund. « Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques ». International Journal for Research in Applied Science and Engineering Technology 11, no 6 (30 juin 2023) : 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.
Texte intégralAnjaneyulu, GSGN, Yogendra Singh Sisodiya et Kumar Saurav. « Novel Composite Encryption for Secrecy in Cloud Computing ». Research Journal of Pharmacy and Technology 9, no 9 (2016) : 1501. http://dx.doi.org/10.5958/0974-360x.2016.00292.4.
Texte intégralRajkumar, N., et E. Kannan. « Attribute-Based Collusion Resistance in Group-Based Cloud Data Sharing using LKH Model ». Journal of Circuits, Systems and Computers 29, no 02 (9 mai 2019) : 2030001. http://dx.doi.org/10.1142/s0218126620300019.
Texte intégralK, Sudha, et Dr Umarani C. « Security Framework for Cloud Information under Transparency of a Key ». International Journal for Research in Applied Science and Engineering Technology 10, no 4 (30 avril 2022) : 1429–36. http://dx.doi.org/10.22214/ijraset.2022.41550.
Texte intégralPark, Junyoung, et Eui-Nam Huh. « eCLASS : Edge-Cloud-Log Assuring-Secrecy Scheme for Digital Forensics ». Symmetry 11, no 10 (22 septembre 2019) : 1192. http://dx.doi.org/10.3390/sym11101192.
Texte intégralNagaraju, Dr Sabout, S. K. V. Jayakumar et C. Swetha Priya. « Efficient Multi-linear Key Pairing Cryptosystem for Reliable Cloud-based Service Provisioning ». Revista Gestão Inovação e Tecnologias 11, no 4 (13 août 2021) : 4440–55. http://dx.doi.org/10.47059/revistageintec.v11i4.2471.
Texte intégralKhan, Yunus, et Sunita Verma. « An Intelligent Blockchain and Software-Defined Networking-Based Evidence Collection Architecture for Cloud Environment ». Scientific Programming 2021 (29 septembre 2021) : 1–19. http://dx.doi.org/10.1155/2021/7294206.
Texte intégralAgarkhed, Jayashree, et R. Ashalatha. « Data Privacy and Security in Cloud Environment Using Cryptography Approach ». Asian Journal of Computer Science and Technology 7, no 1 (5 mai 2018) : 50–54. http://dx.doi.org/10.51983/ajcst-2018.7.1.1830.
Texte intégralQin, Bo, Huaqun Wang, Qianhong Wu, Jianwei Liu et Josep Domingo-Ferrer. « Simultaneous authentication and secrecy in identity-based data upload to cloud ». Cluster Computing 16, no 4 (23 avril 2013) : 845–59. http://dx.doi.org/10.1007/s10586-013-0258-7.
Texte intégralSrilakshmi, K., et P. Bhargavi. « Cloud Computing Security Using Cryptographic Algorithms ». Asian Journal of Computer Science and Technology 8, S3 (5 juin 2019) : 76–80. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2082.
Texte intégralThèses sur le sujet "CLOUD OF SECRECY"
Cornejo-Ramirez, Mario. « Security for the cloud ». Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE049/document.
Texte intégralCryptography has been a key factor in enabling services and products trading over the Internet. Cloud computing has expanded this revolution and it has become a highly demanded service or utility due to the advantages of high computing power, cheap cost of services, high performance, scalability, accessibility as well as availability. Along with the rise of new businesses, protocols for secure computation have as well emerged. The goal of this thesis is to contribute in the direction of securing existing Internet protocols by providing an analysis of the sources of randomness of these protocols and to introduce better protocols for cloud computing environments. We propose new constructions, improving the efficiency of current solutions in order to make them more accessible and practical. We provide a detailed security analysis for each scheme under reasonable assumptions. We study the security in a cloud computing environment in different levels. On one hand, we formalize a framework to study some popular real-life pseudorandom number generators used in almost every cryptographic application. On the other, we propose two efficient applications for cloud computing. The first allows a user to publicly share its high-entropy secret across different servers and to later recover it by interacting with some of these servers using only his password without requiring any authenticated data. The second, allows a client to securely outsource to a server an encrypted database that can be searched and modified later
ALSHIDDI, REEM SAAD. « THE IMPLEMENTATION OF SOCIAL SECRET SHARING IN CLOUD COMPUTING ». OpenSIUC, 2015. https://opensiuc.lib.siu.edu/theses/1626.
Texte intégralAttasena, Varunya. « Secret sharing approaches for secure data warehousing and on-line analysis in the cloud ». Thesis, Lyon 2, 2015. http://www.theses.fr/2015LYO22014/document.
Texte intégralCloud business intelligence is an increasingly popular solution to deliver decision support capabilities via elastic, pay-per-use resources. However, data security issues are one of the top concerns when dealing with sensitive data. Many security issues are raised by data storage in a public cloud, including data privacy, data availability, data integrity, data backup and recovery, and data transfer safety. Moreover, security risks may come from both cloud service providers and intruders, while cloud data warehouses should be both highly protected and effectively refreshed and analyzed through on-line analysis processing. Hence, users seek secure data warehouses at the lowest possible storage and access costs within the pay-as-you-go paradigm.In this thesis, we propose two novel approaches for securing cloud data warehouses by base-p verifiable secret sharing (bpVSS) and flexible verifiable secret sharing (fVSS), respectively. Secret sharing encrypts and distributes data over several cloud service providers, thus enforcing data privacy and availability. bpVSS and fVSS address five shortcomings in existing secret sharing-based approaches. First, they allow on-line analysis processing. Second, they enforce data integrity with the help of both inner and outer signatures. Third, they help users minimize the cost of cloud warehousing by limiting global share volume. Moreover, fVSS balances the load among service providers with respect to their pricing policies. Fourth, fVSS improves secret sharing security by imposing a new constraint: no cloud service provide group can hold enough shares to reconstruct or break the secret. Five, fVSS allows refreshing the data warehouse even when some service providers fail. To evaluate bpVSS' and fVSS' efficiency, we theoretically study the factors that impact our approaches with respect to security, complexity and monetary cost in the pay-as-you-go paradigm. Moreover, we also validate the relevance of our approaches experimentally with the Star Schema Benchmark and demonstrate its superiority to related, existing methods
Wasim, Muhammad Umer <1979>. « Design and Implementation of Legal Protection for Trade Secrets in Cloud Brokerage Architectures relying on Blockchains ». Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amsdottorato.unibo.it/8294/1/WASIM_MUHAMMAD%20UMER__tesi.pdf.
Texte intégralFramner, Erik. « A Configuration User Interface for Multi-Cloud Storage Based on Secret Sharing : An Exploratory Design Study ». Thesis, Karlstads universitet, Handelshögskolan (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-71354.
Texte intégralPRISMACLOUD
Adeka, Muhammad I. « Cryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trust ». Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/11380.
Texte intégralWang, Zhaohong. « Information-Theoretic Secure Outsourced Computation in Distributed Systems ». UKnowledge, 2016. http://uknowledge.uky.edu/ece_etds/88.
Texte intégralCHENG, JUI-JUNG, et 鄭瑞榮. « A Study of Reasonable Measures to Maintain Secrecy in Trade Secret Law-Towards Cloud Computing ». Thesis, 2016. http://ndltd.ncl.edu.tw/handle/2u7b5d.
Texte intégral世新大學
智慧財產權研究所(含碩專班)
104
“The owners have taken reasonable measures to maintain confidentiality” means trade secrets owners objectively take certain behaviors, and let others know that they have intents to protect these information as secrets. There are no legal regulations to decide that whether the measures taken by trade secrets owners are achieved “reasonable” degree or not. It is usually judged by kinds and nature of cases. Although experts and scholars propose specific measures to define that what reasonable measures taken for maintain confidentiality are, they lack of complete thinking and structure. Take possible four stages of business secrets losses summarized by the “Institute for Information Industry”: 1. internal operation; 2. external negotiation; 3. external negotiation afterwards; 4. during dispute process for example, we can learn it form them that what completely reasonable maintain confidentiality are. In addition to traditionally protecting facilities and signing “confidentiality agreements” for protecting business trade secrets, some preventive and remedial reasonable measures include to sign “non-compete agreements” and claim for “confidentiality protective orders,” and so on. At present, enterprises often use cloud computing to storage business secrets, so this thesis attempts to study legal risks of trade secrets losses resulting from insufficient protections of cloud service providers. This study also makes suggestions for research results for enterprises to establish completely reasonable maintain secrets measures and give references to the relevant government agencies. Keyword︰ trade secret, reasonable maintain secrets measures,confidentiality agreements,non-compete agreements,confidentiality protective orders,cloud computing
Li, Jian-Ming, et 李堅銘. « Secret Image Sharing over Distributed Cloud Network ». Thesis, 2018. http://ndltd.ncl.edu.tw/handle/j62pu2.
Texte intégral國立東華大學
資訊工程學系
106
In 1979, Shamir published a landmark paper that a (k, n)-Secret Sharing (SS) hiding a secret data in the constant term of a (k-1)-degree polynomial. Accordingly, by using Shamir’s (k, n)-SS, Thien and Lin extended SS to share digital images. This secret image sharing (SIS) scheme is an important research area combining methods and techniques coming from cryptography and image processing. In (k, n)-SIS scheme a secret image is subdivided into n shadow images (referred to as shadows). By using any k or more than k shadows, the secret image can be recovered. However, any (k-1) or fewer than (k-1) shares cannot obtain any secret information. Up to date, there are many SIS schemes with specific features, e.g., providing authentication, progressive reconstruction, meaningful shadows, sharing multiple secrets. In addition, the SIS schemes with specific thresholds, (t, s, k, n)-SIS scheme and (t, k, n)-SIS scheme, were also studied. Due to the fast growth of cloud network, users may outsource their data to cloud servers. However, the major concern is that the security and privacy should be assured from outsiders, other clients, or even the unauthorized cloud employees. In this thesis, we study the public reconstruction of (k, n)-SIS scheme over distributed cloud network (DCN). In fact, all previous (k, n)-SIS schemes do not deal with public reconstruction of SIS scheme over DCN. Obviously, to enable secure reconstruction over DCN, we need secure communication among all involved participants holding shadows. A naive implementation of secure communication is using an extra key management protocol to deliver a common key to all participants. In this thesis, we use multi-variate symmetric polynomial to obtain public reconstruction of SIS scheme over DCN (SISDCN), which still has the threshold property (recover the secret image from any k shadows) and meanwhile provides secure reconstruction over DCN. Our SISDCN may noninteractively share a common key that establish secure communication among any k participants.
Lin, Cheng-Ting, et 林正庭. « A Secret-Sharing-Based Method for Cloud Storage System ». Thesis, 2015. http://ndltd.ncl.edu.tw/handle/69726621877613632163.
Texte intégral國立中山大學
資訊工程學系研究所
104
In recent years, at an era of information explosion, cloud storage system is wide-spread used in our daily life. However, cloud storage system include many information security issues. The technical of secret sharing is applied to solve these problem include data privacy, data integrity and computational cost. Nevertheless, applying Shamir’s secret sharing scheme to cloud storage system, there are two fetal problems. When we upload the file to the cloud storage system, the size of each share equals to the file such that it waste amount of storage to save these shares; furthermore, a heavy computational cost is required to make shares which is going to be saved in the cloud servers. Therefore, we then proposed a secret-sharing-based method by generating pseudo-random number to replace the real shares such that it reduces the storage cost; in addition, we use just EXCLUSIVE-OR (XOR) operation to reduce the computational cost when computing the shares for each cloud servers.
Livres sur le sujet "CLOUD OF SECRECY"
Dreece, Adam. The man of cloud 9. Calgary : ADZO Publishing Inc., 2016.
Trouver le texte intégralSauveur, Paula. La protection du secret commercial dans les nuages publics de l'infonuagique (cloud computing). Cowansville, Québec : Éditions Y. Blais, 2013.
Trouver le texte intégralKetchup clouds. Bath : Galaxy, 2013.
Trouver le texte intégralOnce the clouds have gone. Valley Falls, NY : Bold Strokes Books, 2014.
Trouver le texte intégralKetchup clouds : A novel. New York : Little, Brown and Company, 2013.
Trouver le texte intégralYun de ao mi : Taiwan pian : Secrets of the cloud II. Taibei Xian Xindian Shi : Ren ren, 2002.
Trouver le texte intégralCole, Leonard A. Clouds of secrecy : The army's germ warfare tests over populated areas. Totowa, N.J : Rowman & Littlefield, 1988.
Trouver le texte intégralCole, Leonard A. Clouds of secrecy : The army's germ warfare tests over populated areas. Savage, Md : Rowman & Littlefield, 1990.
Trouver le texte intégralCole, Leonard A. Clouds of Secrecy : The Army's Germ Warfare Tests Over Populated Areas. Totowa, N.J : Rowman & Littlefield, 1988.
Trouver le texte intégralCole, Leonard A. Clouds of secrecy : The army's germ warfare tests over populated areas. London : Rowman & Littlefield, 1990.
Trouver le texte intégralChapitres de livres sur le sujet "CLOUD OF SECRECY"
Patgiri, Ripon, Malaya Dutta Borah et Laiphrakpam Dolendro Singh. « Data Secrecy : Why Does It Matter in the Cloud Computing Paradigm ? » Dans Modeling, Simulation and Optimization, 549–60. Singapore : Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0836-1_42.
Texte intégralGopika, L., V. K. Kavitha, B. Radhakrishnan et Padma Suresh Lekshmi Kanthan. « Secure Data Sharing in Multiple Cloud Servers Using Forward and Backward Secrecy ». Dans Soft Computing Systems, 335–42. Singapore : Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1936-5_36.
Texte intégralSeele, Peter, et Lucas Zapf. « Conclusion : Our Secrets Behind the Cloud ». Dans Behind the Cloud, 175–83. Berlin, Heidelberg : Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64502-4_6.
Texte intégralSeele, Peter, et Lucas Zapf. « Outlook : Digital Authenticity : Immersive Consumption Without Secrets ». Dans Behind the Cloud, 185–90. Berlin, Heidelberg : Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64502-4_7.
Texte intégralGarbarino, Ernesto. « ConfigMap and Secrets ». Dans Beginning Kubernetes on the Google Cloud Platform, 155–90. Berkeley, CA : Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5491-2_5.
Texte intégralWang, Ming-Ming, Zhi-Guo Qu et Mohamed Elhoseny. « Quantum Secret Sharing in Noisy Environment ». Dans Cloud Computing and Security, 100–112. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68542-7_9.
Texte intégralDolev, Shlomi, et Yin Li. « Secret Shared Random Access Machine ». Dans Algorithmic Aspects of Cloud Computing, 19–34. Cham : Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29919-8_2.
Texte intégralSeele, Peter, et Lucas Zapf. « Summary : Thoughts in a Digital World : Free, but no Longer Secret ». Dans Behind the Cloud, 169–74. Berlin, Heidelberg : Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64502-4_5.
Texte intégralHofheinz, Dennis, et Eike Kiltz. « Scalable Cryptography ». Dans Lecture Notes in Computer Science, 169–78. Cham : Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-21534-6_9.
Texte intégralWang, Ming-Ming, Lu-Ting Tian et Zhi-Guo Qu. « Efficient Multiparty Quantum Secret Sharing Scheme in High-Dimensional System ». Dans Cloud Computing and Security, 23–31. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00012-7_3.
Texte intégralActes de conférences sur le sujet "CLOUD OF SECRECY"
Manohar, S., Manohar Vignesh et Gabrielle Margaret Prabhu. « Sensitive Data Transaction Using RDS in AWS ». Dans International Research Conference on IOT, Cloud and Data Science. Switzerland : Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-3z1665.
Texte intégralReddy P., Muthi, Rekha Rangappa Dasar, R. Tanuja, S. H. Manjula et K. R. Venugopal. « Forward Secrecy in Authentic and Anonymous Cloud with Time Optimization ». Dans 2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN). IEEE, 2018. http://dx.doi.org/10.1109/wocn.2018.8556130.
Texte intégralOgiela, Marek R., Lidia Ogiela et Urszula Ogiela. « Intelligent Bio-inspired Approach for Secrecy Management in the Cloud ». Dans 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC). IEEE, 2014. http://dx.doi.org/10.1109/3pgcic.2014.78.
Texte intégralMarina, Ninoslav, Natasha Paunkoska et Aneta Velkoska. « Improved bounds on secrecy capacity in twin-code cloud storage framework ». Dans 2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2016. http://dx.doi.org/10.1109/icumt.2016.7765384.
Texte intégralYoo, Seungmin, Jeongwan Koh, Donggu Kim et Joonhyuk Kang. « Cloud and Edge Processing by Precoder Design for Secrecy Rate Maximization ». Dans 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, 2019. http://dx.doi.org/10.1109/ccnc.2019.8651780.
Texte intégralPatgiri, Ripon, Malaya Dutta Borah et Laiphrakpam Dolendro Singh. « SecretStore : A Secrecy as a Service model to enable the Cloud Storage to store user's secret data ». Dans 2021 26th IEEE Asia-Pacific Conference on Communications (APCC). IEEE, 2021. http://dx.doi.org/10.1109/apcc49754.2021.9609895.
Texte intégralWang, Li, Tenghui Ke, Mei Song, Yifei Wei et Yinglei Teng. « Research on secrecy capacity oriented relay selection for mobile cooperative networks ». Dans 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS). IEEE, 2011. http://dx.doi.org/10.1109/ccis.2011.6045106.
Texte intégralXiao, Chen, Zhu Yan, Yin Xinxing, Li Fangbiao, Xue Zhi, Zhou Yongkai et Pang Liang. « Research on the Vulnerability of MIMO Secrecy using AN Matrix Blind Space Elimination ». Dans 1st International Workshop on Cloud Computing and Information Security. Paris, France : Atlantis Press, 2013. http://dx.doi.org/10.2991/ccis-13.2013.117.
Texte intégralYan, Zhu, Chen Xiao, Zhou Yongkai, Li Fangbiao, Pang Liang, Yin Xinxing et Xue Zhi. « Research on the Secrecy Achievable Rate Region for the Broadcast channel with eavesdropper ». Dans 1st International Workshop on Cloud Computing and Information Security. Paris, France : Atlantis Press, 2013. http://dx.doi.org/10.2991/ccis-13.2013.19.
Texte intégralKumar, Naveen, Anish Mathuria et Manik Lal Das. « Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System ». Dans 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2015. http://dx.doi.org/10.1109/trustcom.2015.513.
Texte intégral