Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: DNA-based secure data storage.

Artykuły w czasopismach na temat „DNA-based secure data storage”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „DNA-based secure data storage”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

P., Poonguzhali, Prajyot Dhanokar, M. K. Chaithanya i Mahesh U. Patil. "Secure Storage of Data on Android Based Devices". International Journal of Engineering and Technology 8, nr 3 (marzec 2016): 177–82. http://dx.doi.org/10.7763/ijet.2016.v6.880.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

P., Poonguzhali, Prajyot Dhanokar, M. K. Chaithanya i Mahesh U. Patil. "Secure Storage of Data on Android Based Devices". International Journal of Engineering and Technology 8, nr 3 (marzec 2016): 177–82. http://dx.doi.org/10.7763/ijet.2016.v8.880.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Chen, Kaikai, Jinbo Zhu, Filip Bošković i Ulrich F. Keyser. "Nanopore-Based DNA Hard Drives for Rewritable and Secure Data Storage". Nano Letters 20, nr 5 (30.03.2020): 3754–60. http://dx.doi.org/10.1021/acs.nanolett.0c00755.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Manimekalai, R., i M. Chandra Kumar Peter. "Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud". International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (30.06.2018): 252–54. http://dx.doi.org/10.31142/ijtsrd13014.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

S, Rajasekaran, Kalifulla Y, Murugesan S, Ezhilvendan M i Gunasekaran J. "Authentication Based Cloud Storage and Secure Data Forwarding". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, nr 1 (1.02.2013): 106–10. http://dx.doi.org/10.24297/ijct.v4i1b.3068.

Pełny tekst źródła
Streszczenie:
cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party’s cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. The main technical contribution is that the proxy re-encryption scheme supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages. Our method fully integrates encrypting, encoding, and forwarding. We analyze and suggest suitable parameters for the number of copies of a message dispatched to storage servers and the number of storage servers queried by a key server. These parameters allow more flexible adjustment between the number of storage servers and robustness.
Style APA, Harvard, Vancouver, ISO itp.
6

Go, Woong, i Jin Kwak. "Dual server-based secure data-storage system for cloud storage". International Journal of Engineering Systems Modelling and Simulation 6, nr 1/2 (2014): 86. http://dx.doi.org/10.1504/ijesms.2014.058428.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Chenchen Han, Chenchen Han, Gwang-Jun Kim Chenchen Han, Osama Alfarraj Gwang-Jun Kim, Amr Tolba Osama Alfarraj i Yongjun Ren Amr Tolba. "ZT-BDS: A Secure Blockchain-based Zero-trust Data Storage Scheme in 6G Edge IoT". 網際網路技術學刊 23, nr 2 (marzec 2022): 289–95. http://dx.doi.org/10.53106/160792642022032302009.

Pełny tekst źródła
Streszczenie:
<p>With the rapid development of 6G communication technology, data security of the Internet of Things (IoT) has become a key challenge. This paper first analyzes the security issues and risks of IoT data storage in 6G, and then constructs a blockchain-based zero-trust data storage scheme (ZT-BDS) in 6G edge IoT to ensure data security. Under this framework, an improved scratch-off puzzle based on Proof of Recoverability (PoR) is firstly constructed to realize distributed IoT data storage, which can reduce resource consumption compared with other existing schemes. Secondly, the accumulator is used to replace the Merkle trees to store IoT data in the blockchain. Since the accumulator can provide not only membership proof, but also non-membership proof, the proposed blockchain-based data storage scheme is more secure. Thirdly, PoW is replaced by an improved PoR scheme as the consensus protocol. On the one hand, PoR can verify the integrity of data, which will further enhance the security of IoT data; on the other hand, the proposed PoR is composed of polynomial commitment, which can reduce bandwidth with the aid of the aggregation function of polynomial commitment. Experimental comparisons show that our scheme has better bandwidth and storage capacity.</p> <p>&nbsp;</p>
Style APA, Harvard, Vancouver, ISO itp.
8

Yuliang Shi, Kun Zhang i Qingzhong Li. "Meta-data Driven Data Chunk Based Secure Data Storage for SaaS". International Journal of Digital Content Technology and its Applications 5, nr 1 (31.01.2011): 173–85. http://dx.doi.org/10.4156/jdcta.vol5.issue1.18.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Hsiao-Ying Lin i Wen-Guey Tzeng. "A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding". IEEE Transactions on Parallel and Distributed Systems 23, nr 6 (czerwiec 2012): 995–1003. http://dx.doi.org/10.1109/tpds.2011.252.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Javed, Muhammad Umar, Mubariz Rehman, Nadeem Javaid, Abdulaziz Aldegheishem, Nabil Alrajeh i Muhammad Tahir. "Blockchain-Based Secure Data Storage for Distributed Vehicular Networks". Applied Sciences 10, nr 6 (16.03.2020): 2011. http://dx.doi.org/10.3390/app10062011.

Pełny tekst źródła
Streszczenie:
In this paper, a blockchain-based secure data sharing mechanism is proposed for Vehicular Networks (VNs). Edge service providers are introduced along with ordinary nodes to efficiently manage service provisioning. The edge service providers are placed in the neighborhood of the ordinary nodes to ensure smooth communication between them. The huge amount of data generated by smart vehicles is stored in a distributed file storage system, known as Interplanetary File System (IPFS). It is used to tackle the issues related to data storage in centralized architectures, such as data tampering, lack of privacy, vulnerability to hackers, etc. Monetary incentives are given to edge vehicle nodes to motivate them for accurate and timely service provisioning to ordinary nodes. In response, ordinary nodes give reviews to the edge nodes against the services provided by them, which are further stored in a blockchain to ensure integrity, security and transparency. Smart contracts are used to automate the system processes without the inclusion of an intermediate party and to check the reviews given to the edge nodes. To optimize gas consumption and to enhance the system performance, a Proof of Authority (PoA) consensus mechanism is used to validate the transactions. Moreover, a caching system is introduced at the edge nodes to store frequently used services. Furthermore, both security and privacy are enhanced in the proposed system by incorporating a symmetric key cryptographic mechanism. A trust management mechanism is also proposed in this work to calculate the nodes’ reputation values based upon their trust values. These values determine the authenticity of the nodes involved in the network. Eventually, it is concluded from the simulation results that the proposed system is efficient for VNs.
Style APA, Harvard, Vancouver, ISO itp.
11

Ramadevi, M., i D. Bulla Rao. "A Novel identity based secure distributed data storage scheme". IOSR Journal of Computer Engineering 16, nr 6 (2014): 53–59. http://dx.doi.org/10.9790/0661-16645359.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Grosges, Thomas, i Dominique Barchiesi. "Toward nanoworld-based secure encryption for enduring data storage". Optics Letters 35, nr 14 (9.07.2010): 2421. http://dx.doi.org/10.1364/ol.35.002421.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Dwivedi, Sandhya, i Juhi Kanungo. "TSDT: TPA Based Secure Data Transmission of Cloud Data Storage System". IJARCCE 6, nr 6 (30.06.2017): 499–507. http://dx.doi.org/10.17148/ijarcce.2017.6688.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Feng, Tao, Xusheng Wang, Chunyan Liu i Junli Fang. "Secure Data Collaborative Computing Scheme Based on Blockchain". Security and Communication Networks 2021 (13.01.2021): 1–9. http://dx.doi.org/10.1155/2021/6630291.

Pełny tekst źródła
Streszczenie:
With the rapid development of information technology, different organizations cooperate with each other to share data information and make full use of data value. Not only should the integrity and privacy of data be guaranteed but also the collaborative computing should be carried out on the basis of data sharing. In this paper, in order to achieve the fairness of data security sharing and collaborative computing, a security data collaborative computing scheme based on blockchain is proposed. A data storage query model based on Bloom filter is designed to improve the efficiency of data query sharing. The MPC contract is designed according to the specific requirements. The participants are rational, and the contract encourages the participants to implement the agreement honestly to achieve fair calculation. A secure multiparty computation based on secret sharing is introduced. The problem of identity and vote privacy in electronic voting is solved. The scheme is analyzed and discussed from storage expansion, anticollusion, verifiability, and privacy.
Style APA, Harvard, Vancouver, ISO itp.
15

Babu, K. R. Remesh, i K. P. Madhu. "Intelligent Secure Storage Mechanism for Big Data". Webology 18, Special Issue 01 (29.04.2021): 246–61. http://dx.doi.org/10.14704/web/v18si01/web18057.

Pełny tekst źródła
Streszczenie:
The management of big data became more important due to the wide spread adoption of internet of things in various fields. The developments in technology, science, human habits, etc., generates massive amount of data, so it is increasingly important to store and protect these data from attacks. Big data analytics is now a hot topic. The data storage facility provided by the cloud computing enabled business organizations to overcome the burden of huge data storage and maintenance. Also, several distributed cloud applications supports them to analyze this data for taking appropriate decisions. The dynamic growth of data and data intensive applications demands an efficient intelligent storage mechanism for big data. The proposed system analyzes IP packets for vulnerabilities and classifies data nodes as reliable and unreliable nodes for the efficient data storage. The proposed Apriori algorithm based method automatically classifies the nodes for intelligent secure storage mechanism for the distributed big data storage.
Style APA, Harvard, Vancouver, ISO itp.
16

Shaharkar, Bhushan B., i Darshan P. Pandit. "ML Based Authentication Scheme for Data Storage in Cloud Based IoT". International Journal of Engineering and Advanced Technology 11, nr 6 (30.08.2022): 123–27. http://dx.doi.org/10.35940/ijeat.f3767.0811622.

Pełny tekst źródła
Streszczenie:
Today, organizations are using IoT devices to accurately collect real data and make better business decisions to increase customer satisfaction. The data collected should be stored and stored in a well-designed storage system, which encourages companies to review their data storage infrastructure. The company needs to store data created by the Internet of Things, and that data grows exponentially, forcing IoT to think about cloud storage for data storage. Security issues are a major concern when handling and processing data in DI and cloud environments. Secure integration of IoT and cloud computing, and introduced a model to ensure this integration. The secure database of any IoT operating system was suffers from poorly protected read and write functions, which limits data storage on any IoT platform. In addition, clouds can provide space to store a wide variety of data that plays an important role in the world of cyber security. However, large centralized systems operating in the cloud are also very vulnerable due to their power, so they can be transformed into a kind of double-edged sword. In this paper, we propose a novel secure lightweight authentication scheme for data storage (SLA-DS) in IoT and cloud server. The SLA-DS integrates IoT and cloud technology combination which mainly focuses on security issues.
Style APA, Harvard, Vancouver, ISO itp.
17

SeethaRamulu, Banoth, H. Balaji i Bashetty Suman. "Attribute based Access Control Scheme in Cloud Storage System". International Journal of Engineering & Technology 7, nr 4.6 (25.09.2018): 33. http://dx.doi.org/10.14419/ijet.v7i4.6.20228.

Pełny tekst źródła
Streszczenie:
Cloud Computing is an emerging technology now a days , where cloud is most preferable when there is data backup, storage and data distribution service with low cost. But cloud is semi honest in nature due to not reveled storage and security structure thus while storing and sharing cloud data , its suppose to honest and secured. When data owners outsource their data in secured manner system should assure the security, data integrity and confidentiality. Here we noticed secure access controlling is the prime objective for sensitive data management.in this regards we have been used ABE (Attribute based encryption) for the above objective. This paper concentrates on secure storage and sharing system.
Style APA, Harvard, Vancouver, ISO itp.
18

Saikeerthana, R., i A. Umamakeswari. "Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption". Indian Journal of Science and Technology 8, S9 (10.05.2015): 318. http://dx.doi.org/10.17485/ijst/2015/v8is9/65600.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Li, Hongzhi, Dezhi Han i Mingdong Tang. "Logisticschain: A Blockchain-Based Secure Storage Scheme for Logistics Data". Mobile Information Systems 2021 (3.02.2021): 1–15. http://dx.doi.org/10.1155/2021/8840399.

Pełny tekst źródła
Streszczenie:
With the rapid development of information technology, logistics systems are developing towards intelligence. The Internet of Things (IoT) devices throughout the logistics network could provide strong support for smart logistics. However, due to the limited computing and storage resources of IoT devices, logistics data with user sensitive information are generally stored in a centralized cloud center, which could easily cause privacy leakage. In this paper, we propose Logisticschain, a blockchain-based secure storage scheme for logistics data. In this scheme, the sensing data from IoT devices should be encrypted for fine-grained access control, and a customized blockchain structure is proposed to improve the storage efficiency of systems. Also, an efficient consensus mechanism is introduced to improve the efficiency of the consensus process in the blockchain. Specific to the logistics process, the sensing data generated from IoT devices will be encrypted and aggregated into the blockchain to ensure data security. Moreover, the stored logistics records can be securely audited by leveraging the blockchain network; both IoT data and logistics demands cannot be deleted or tampered to avoid disputes. Finally, we analyze the security and privacy properties of our Logisticschain and evaluate its performance in terms of computational costs by developing an experimental platform.
Style APA, Harvard, Vancouver, ISO itp.
20

Wang, Jin, Wencheng Chen, Lei Wang, R. Simon Sherratt, Osama Alfarraj i Amr Tolba. "Data Secure Storage Mechanism of Sensor Networks Based on Blockchain". Computers, Materials & Continua 65, nr 3 (2020): 2365–84. http://dx.doi.org/10.32604/cmc.2020.011567.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Yu, Yong, Yannan Li, Bo Yang, Willy Susilo, Guomin Yang i Jian Bai. "Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage". IEEE Transactions on Emerging Topics in Computing 8, nr 2 (1.04.2020): 377–90. http://dx.doi.org/10.1109/tetc.2017.2759329.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Cui, Hui, Robert H. Deng i Yingjiu Li. "Attribute-based cloud storage with secure provenance over encrypted data". Future Generation Computer Systems 79 (luty 2018): 461–72. http://dx.doi.org/10.1016/j.future.2017.10.010.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Lin, Siyu, i Hao Wu. "Bloom Filter-Based Secure Data Forwarding in Large-Scale Cyber-Physical Systems". Mathematical Problems in Engineering 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/150512.

Pełny tekst źródła
Streszczenie:
Cyber-physical systems (CPSs) connect with the physical world via communication networks, which significantly increases security risks of CPSs. To secure the sensitive data, secure forwarding is an essential component of CPSs. However, CPSs require high dimensional multiattribute and multilevel security requirements due to the significantly increased system scale and diversity, and hence impose high demand on the secure forwarding information query and storage. To tackle these challenges, we propose a practical secure data forwarding scheme for CPSs. Considering the limited storage capability and computational power of entities, we adopt bloom filter to store the secure forwarding information for each entity, which can achieve well balance between the storage consumption and query delay. Furthermore, a novel link-based bloom filter construction method is designed to reduce false positive rate during bloom filter construction. Finally, the effects of false positive rate on the performance of bloom filter-based secure forwarding with different routing policies are discussed.
Style APA, Harvard, Vancouver, ISO itp.
24

Zhou, Bao, Junsan Zhao, Guoping Chen i Ying Yin. "Research on Secure Storage Technology of Spatiotemporal Big Data Based on Blockchain". Applied Sciences 13, nr 13 (6.07.2023): 7911. http://dx.doi.org/10.3390/app13137911.

Pełny tekst źródła
Streszczenie:
With the popularity of spatiotemporal big data applications, more and more sensitive data are generated by users, and the sharing and secure storage of spatiotemporal big data are faced with many challenges. In response to these challenges, the present paper puts forward a new technology called CSSoB (Classified Secure Storage Technology over Blockchain) that leverages blockchain technology to enable classified secure storage of spatiotemporal big data. This paper introduces a twofold approach to tackle challenges associated with spatiotemporal big data. First, the paper proposes a strategy to fragment and distribute space–time big data while enabling both encryption and nonencryption operations based on different data types. The sharing of sensitive data is enabled via smart contract technology. Second, CSSoB’s single-node storage performance was assessed under local and local area network (LAN) conditions, and results indicate that the read performance of CSSoB surpasses its write performance. In addition, read and write performance were observed to increase significantly as the file size increased. Finally, the transactions per second (TPS) of CSSoB and the Hadoop Distributed File System (HDFS) were compared under varying thread numbers. In particular, when the thread number was set to 100, CSSoB demonstrated a TPS improvement of 7.8% in comparison with HDFS. Given the remarkable performance of CSSoB, its adoption can not only enhance storage performance, but also improve storage security to a great extent. Moreover, the fragmentation processing technology employed in this study enables secure storage and rapid data querying while greatly improving spatiotemporal data processing capabilities.
Style APA, Harvard, Vancouver, ISO itp.
25

Mathur, Neha, Shweta Sinha, Rajesh Kumar Tyagi i Nishtha Jatana. "Analysis of Secure Data Sharing Techniques Using Blockchain". Fusion: Practice and Applications 10, nr 2 (2023): 42–54. http://dx.doi.org/10.54216/fpa.100204.

Pełny tekst źródła
Streszczenie:
The demand for cloud computing has increased immensely, and its security is becoming challenging. The enormous growth in cloud computing adaptation has been observed, but the information security concerns have not been addressed thoroughly. The security issues related to cloud computing are a concern. The emergence of Blockchain as a key security provider has increased the hope for the availability of a secure cloud computing environment. The data-sharing technique based on the cloud scenario relies on the network's storage and architecture; however, the storage providers are considered trusted third parties for data-sharing and storage purposes. The associated limitations such as security, high operational cost, centralized storage capability, and data availability have become a challenging task, which leads to the development of a trusted data management system for secure data sharing through the Blockchain. This study presents an analysis of secure data-sharing techniques using Blockchain. The related research articles were elicited from several sources such as Springer, IEEE, Elsevier, and other online sources. The primary studies have been categorized into four types: healthcare data sharing, vehicular communication-based data sharing, IoT-based data sharing, and other miscellaneous techniques. The techniques have been analyzed based on various performance metrics. The analysis and findings of this study can pave a way for the future development of safe data-sharing techniques using Blockchain technology.
Style APA, Harvard, Vancouver, ISO itp.
26

R, Rushyanthan. "Blockchain Based Secured Document Storage for Cloud". International Journal for Research in Applied Science and Engineering Technology 10, nr 8 (31.08.2022): 1979–86. http://dx.doi.org/10.22214/ijraset.2022.46528.

Pełny tekst źródła
Streszczenie:
Abstract: Internet is the most common way used to share data around the globe. This sharing is backed by various cloud providers that allow customers to store & share data on the internet. But when it comes to privacy, cloud providers have consistently failed to make data 100% secure. Many data breaches, data piracy, hacking attacks have threatened the security mechanism of cloud providers. Though data stored by the customers should be 100% secure as it may contain private data which must be only accessible to the owner itself and some intended audience. So, it is very important to make this system more secure, so that data privacy & trust onto cloud providers can be maintained. We introduce a system that leverages the security of cloudbased data onto the blockchain. It allows users to store data onto the cloud and provides a prominent access control mechanism that will ensure the privacy of data. Users will be able to share data with other people in a permissioned manner by sharing the link for document with the intended user. Logs of all the operations performed with the document will be available to the owner at any instance of time. This will ensure the actual ownership & privacy of the data. Any person or third-party will not be able to access document without valid permission. This will make existing cloud storage more secure & decrease the data breaches & several attacks.
Style APA, Harvard, Vancouver, ISO itp.
27

Inbaraj, X. Alphonse, i A. Seshagiri Rao. "Modified Secure Data Deduplication Computing in Cloud based Environment". Circulation in Computer Science 2, nr 7 (20.08.2017): 14–19. http://dx.doi.org/10.22632/ccs-2017-252-42.

Pełny tekst źródła
Streszczenie:
Security has been a concern since the early days of computing, when a computer was isolated in a room and a threat could be posed only by malicious insiders. To support authorized Data Deduplication in cloud computing ,encryption is enhanced before outsource. Data Deduplication helps to store identical copy of data in Cloud Storage and that consumption is low bandwidth. Third Party control generates a spectrum of concerns caused by the lack of transparency and limited user control .For example , a cloud provider may subcontract some resources from a third party whose level of trust is questionable. There are examples when subcontractors fails to maintain the customer data. There are also examples when third party was not a subcontractor but a hardware supplier and the loss of data was caused by poor –quality storage devices[12].To overcome the problem of integrity and security, this paper makes the first attempt that applying Data Coloring, Watermarking techniques on shared data objects. Then applying Merkle Hash Tree[11],make tighten access control for sensitive data in both private and public clouds.
Style APA, Harvard, Vancouver, ISO itp.
28

Shrivastava, Gaurav, i Sachin Patel. "Secure Storage and Data Sharing Scheme Using Private Blockchain-Based HDFS Data Storage for Cloud Computing". International Journal of Computer Networks and Applications 10, nr 1 (1.01.2023): 28. http://dx.doi.org/10.22247/ijcna/2023/218509.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Geetha, G., G. Surekha, P. Aditya Sharma i E. Uma Shankari. "Provide a secured automatic program algorithm for DNA sequence storage arrangement in cloud". International Journal of Engineering & Technology 7, nr 2.20 (18.04.2018): 10. http://dx.doi.org/10.14419/ijet.v7i2.20.11733.

Pełny tekst źródła
Streszczenie:
The primary target of this paper is to provide a secured implementing algorithm for hiding DNA sample sequence data confidently by using special software in cloud computing environments. The suggested algorithm here for hiding DNA sequences is based on binary coding and complementary pairing rules. Hence DNA reference sequence is taken as a sample secret data with a notation of M. But after applying some steps the final result obtained in cloud environment is M’’’. The procedure of identifying or extracting the original data M from the hidden DNA Reference sequence is depended on the user if and only if the user wants to use the data for process. Likewise there are security issues for the manipulating from claiming information. In this way that accessible user’s information arrangement may be isolated under SPs in such a way that it has to reach minimum number of specified threshold SPs number from the whole data block. In this paper, we recommend A low cost secured and multi- cloud storage (SCMCS) model over cloud computing which holds an prudent appropriation about information Around the accessible SPs in the market, with gatherings gives client information accessibility and additionally secure capacity.
Style APA, Harvard, Vancouver, ISO itp.
30

Thangavel, M., i P. Varalakshmi. "Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud". Cluster Computing 21, nr 2 (22.11.2017): 1411–37. http://dx.doi.org/10.1007/s10586-017-1368-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Johnson, Reena, i M. V. Bramhe. "A Technique for Secure Data Deduplication in Cloud Storage". International Journal of Advanced Research in Computer Science and Software Engineering 7, nr 12 (30.12.2017): 91. http://dx.doi.org/10.23956/ijarcsse.v7i12.513.

Pełny tekst źródła
Streszczenie:
Today people are depending on cloud for their wide storage needs, hence efficient storage methods need to be employed . This can be achieved using Data Deduplication. Data Deduplication is a method to reduce the storage need by eliminating redundant data. Thus by storing less data you would need less hardware and would be able to better utilize the existing storage space. Based on this idea, we design an encryption scheme that guarantees semantic security for unpopular data and provides weaker security and better storage and bandwidth benefits for popular data. This way, data deduplication can be effective for popular data, whilst semantically secure encryption protects unpopular content. We show that our scheme is secure under the Symmetric External Decisional Diffie-Hellman Assumption in the random oracle model.
Style APA, Harvard, Vancouver, ISO itp.
32

Li, Jingyi. "Research on dynamic and secure storage of financial data based on cloud platform". Web Intelligence 19, nr 4 (20.01.2022): 263–74. http://dx.doi.org/10.3233/web-210472.

Pełny tekst źródła
Streszczenie:
Traditional financial data storage methods are prone to data leakage and narrow data coverage. Therefore, this paper proposes a dynamic and secure storage method of financial data based on cloud platform.In order to improve the ability of enterprise data management, the paper constructs a financial cloud computing platform, mining financial data by rough set theory, and analyzing the results of frequent pattern mining of financial data by fuzzy attribute characteristics.According to the granularity theory, the financial data is classified and processed, and the CSA cloud risk model is established to realize the dynamic and secure storage of financial data.The experimental results show that. The maximum data storage delay of this method is no more than 4.1 s, the maximum data leakage risk coefficient is no more than 0.5, the number of data types can reach 30, and the data storage coverage is improved.
Style APA, Harvard, Vancouver, ISO itp.
33

Ramesh, Dharavath, Rahul Mishra i Damodar Reddy Edla. "Secure Data Storage in Cloud: An e-Stream Cipher-Based Secure and Dynamic Updation Policy". Arabian Journal for Science and Engineering 42, nr 2 (2.12.2016): 873–83. http://dx.doi.org/10.1007/s13369-016-2357-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Phale, Jayesh, Ass Prof Soni R. Ragho, Rushikesh Kale, Priya Yelakar i Priyanka Sul. "Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud". International Journal for Research in Applied Science and Engineering Technology 11, nr 5 (31.05.2023): 3749–53. http://dx.doi.org/10.22214/ijraset.2023.52497.

Pełny tekst źródła
Streszczenie:
Abstract: Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing specific credentials (or attributes). However, the standard ABE system does not support secure deduplication, which is crucial for eliminating duplicate copies of identical data in order to save storage space and network bandwidth. In this paper, we present an attribute-based storage system with secure deduplication in a hybrid cloud setting, where a private cloud is responsible for duplicate detection and a public cloud manages the storage. Compared with the prior data deduplication systems, our system has two advantages. First, it can be used to confidentially share data with users by specifying access policies rather than sharing decryption keys. Second, it achieves the standard notion of semantic security for data confidentiality while existing systems only achieve it by defining a weaker security notion. In addition, we put forth a methodology to modify a ciphertext over one access policy into ciphertexts of the same plaintext but under other access policies without revealing the underlying plaintext.
Style APA, Harvard, Vancouver, ISO itp.
35

Passricha, Vishal, Ashish Chopra i Shubhanshi Singhal. "Secure Deduplication Scheme for Cloud Encrypted Data". International Journal of Advanced Pervasive and Ubiquitous Computing 11, nr 2 (kwiecień 2019): 27–40. http://dx.doi.org/10.4018/ijapuc.2019040103.

Pełny tekst źródła
Streszczenie:
Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users towards CS but this causes a lot of storage pressure on CS systems because a large volume of this data is redundant. Data deduplication is an effective data reduction technique. The dynamic nature of data makes security and ownership of data as a very important issue. Proof-of-ownership schemes are a robust way to check the ownership claimed by any owner. However, this method affects the deduplication process because encryption methods have varying characteristics. A convergent encryption (CE) scheme is widely used for secure data deduplication. The problem with the CE-based scheme is that the user can decrypt the cloud data while he has lost his ownership. This article addresses the problem of ownership revocation by proposing a secure deduplication scheme for encrypted data. The proposed scheme enhances the security against unauthorized encryption and poison attack on the predicted set of data.
Style APA, Harvard, Vancouver, ISO itp.
36

Zhang, Zhuyun, i Yanjun Geng. "A Secure Cloud Storage Algorithm for University Financial Data Based on the Blockchain Technology". Mobile Information Systems 2022 (31.08.2022): 1–9. http://dx.doi.org/10.1155/2022/5030738.

Pełny tekst źródła
Streszczenie:
In order to increase the secure storage capacity of university financial system process operation data under the blockchain environment, a secure cloud storage algorithm of university financial data based on the blockchain technology is proposed. The blockchain storage structure model of university financial system process operation data is first constructed, and then the mapping method of Atlas features is adopted. Finally, the blockchain equilibrium configuration parameter analysis model of university financial system process operation data is established. According to the outcomes of the feature extraction process of cloud resource storage Atlas of university financial system process operation data, the fuzzy clustering method is implemented to comprehend the rational planning of cloud storage space. The resource cloud storage structure configuration of university financial system process operation data in cloud environment is realized by using the method of block link fusion and channel equilibrium configuration. The multi-layer modal structure decomposition and fuzzy clustering processing are carried out on university financial system process operation data storage information in blockchain environment by using the empirical mode decomposition method. According to the data graph clustering results, the cloud resource graph of university financial system process operation data becomes smooth in the adjacent wave domain through cloud information fusion and block clustering, which effectively reduces the data storage overhead and improves the secure cloud storage capability of university financial data. The simulation outcomes indicate that this approach can significantly increase the storage performance of process operation data of university financial system under blockchain environment, with better data classification storage, internal structure information fusion performance of university financial data, and lower storage overhead than other methods. We observed that this improvement, in terms of storage overhead costs, can be as high as 43.67% higher than the wavelet method and 30.45% higher than the mode decomposition approach.
Style APA, Harvard, Vancouver, ISO itp.
37

Song, Heqing, Jifei Li i Haoteng Li. "A Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption". IEEE Access 9 (2021): 63745–51. http://dx.doi.org/10.1109/access.2021.3075340.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Ren, Yongjun, Yan Leng, Yaping Cheng i Jin Wang. "Secure data storage based on blockchain and coding in edge computing". Mathematical Biosciences and Engineering 16, nr 4 (2019): 1874–92. http://dx.doi.org/10.3934/mbe.2019091.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Cui, Hui, Robert H. Deng, Yingjiu Li i Guowei Wu. "Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud". IEEE Transactions on Big Data 5, nr 3 (1.09.2019): 330–42. http://dx.doi.org/10.1109/tbdata.2017.2656120.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

Nagasri, Y., P. Deepika i P. Sandhya Priya. "Efficient and Secure Data Forwarding for Erasure code Based Cloud Storage". International Journal of Computer Trends and Technology 35, nr 2 (25.05.2016): 76–78. http://dx.doi.org/10.14445/22312803/ijctt-v35p113.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
41

Kale, Rushikesh, Assi Prof Soni R. Ragho, Jayesh Phale, Priya Yelakar i Priyanka Sul. "Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud". International Journal for Research in Applied Science and Engineering Technology 11, nr 3 (31.03.2023): 1385–89. http://dx.doi.org/10.22214/ijraset.2023.49675.

Pełny tekst źródła
Streszczenie:
Abstract: At present data duplication will extend in the dispersed stockpiling locales and in view of this duplicate substance the appropriated extra room may diminished. To additionally foster the additional room of the cloud, we need to play out the deduplication on dispersed extra room. In this paper, we are doing Trademark based Encryption (ABE) plot used to help the safeguarded deduplication. Not simply secure deduplication, in this paper we additionally doing get to systems to share the data furtively to the cloud clients. In our proposed structure the deduplication processes done by the private dislike ordinary deduplication plans. From the preliminary outcomes we can show the way that the proposed system can generally chip away at the strong deduplication execution close by secretly data sharing.
Style APA, Harvard, Vancouver, ISO itp.
42

Mule, Balakrishna Reddy, Rishi Raj Kumar, Gude Srinivasulu, Gaddam Ranga Uday Sudheer i Dr K. Bala. "Secure Data Storage Using Erasure-Coding in Cloud Environment". International Journal for Research in Applied Science and Engineering Technology 11, nr 5 (31.05.2023): 872–75. http://dx.doi.org/10.22214/ijraset.2023.51636.

Pełny tekst źródła
Streszczenie:
Abstract: The current storage mechanism currently stores user data on cloud servers. Thus, users give up their rights. You don't have control over the data and run the danger of privacy violations. Encryption technology is often the cornerstone of the traditional privacy protection strategies even if it is not very effective at thwarting assaults from within a cloud server because it cannot be fully analyzed from within. This paper's goal is to offer a fog computing-based three-layer storage structure for resolving the cloud storage issue. Frameworks like the one this study suggests can be utilized to fully utilize cloud storage while preserving user privacy. The Hash-Solomon coding technique also enables the segmentation of data. Then, to ensure privacy, a small amount of data can be stored on local computers and fog servers. The theoretical safety study and experimental assessment have demonstrated the feasibility of our proposal, which is a major advance over the existing cloud storage method. If one data component is missing, all the data information is lost. We shall demonstrate the effectiveness of the system as we secure it. Using this computational intelligence-based method, it is also possible to calculate the distribution percentage that is stored in clouds, fog, and local computers. Through theoretical safety analysis and experimental evaluation, our strategy— which represents a significant improvement over the current cloud storage strategy—has been demonstrated to be workable. If one data component is missing, all the data information is lost. Additionally, the distribution fraction saved can be determined thanks to the computational intelligence employed in this method.
Style APA, Harvard, Vancouver, ISO itp.
43

Sivasankari, S., V. Lavanya, G. Saranya i S. Lavanya. "Attributes Based Storage System for Secure De-Duplication of Encrypt Data in Cloud". Journal of Computational and Theoretical Nanoscience 17, nr 4 (1.04.2020): 1937–42. http://dx.doi.org/10.1166/jctn.2020.8470.

Pełny tekst źródła
Streszczenie:
These days, Cloud storage is gaining importance among individual and institutional users. Individual and foundations looks for cloud server as a capacity medium to diminish their capacity load under nearby devices. In such storage services, it is necessary to avoid duplicate content/repetitive storage of same data to be avoided. By reducing the duplicate content in cloud storage reduces storage cost. De-duplication is necessary when multiple data owner outsource the same data, issues related to security and ownership to be considered. As the cloud server is always considered to be non trusted, as it is maintained by third party, thus the data stored in cloud is always encrypted and uploaded, thus randomization property of encryption affects de-duplication. It is necessary to propose a serverside de-duplication scheme for handling encrypted data. The proposed scheme allows the cloud server to control access to outsourced data even when the ownership changes dynamically.
Style APA, Harvard, Vancouver, ISO itp.
44

Reddy, P. Radha Krishna, S. Sivaramaiah i U. Sesadri. "Secure Data Forwarding in Cloud Storage System by using UMIB Proxy". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, nr 8 (30.08.2013): 1905–12. http://dx.doi.org/10.24297/ijct.v10i8.1472.

Pełny tekst źródła
Streszczenie:
The cloud storage system is a model consists of networked online collection of storage servers that provides long-term storage services over the Internet hosted by the third parties. Storing data in third party’s cloud system creates serious problems over data confidentiality & authorization. The normal encryption schemes may protect data confidentiality from unauthorized users, but these techniques are limited based on their functionality because only few operations are supported over encrypted data.It’s a challenging task to construct secure storage system with multiple functionalities, if the storage system is distributed. In this paper we developed a secure distributed storage system by using (UMIB-PRE) Unidirectional and Multiuse Identity based proxy re encryption technique with decentralized erasure code. The main theme of this UMIB proxy re encryption is to support encoding, storing and forwarding operations over encrypted data. Our method full supports encryption, decryption, encoding and forwarding techniques. We also suggest possible parameters for these key servers and storage servers as well. These parameters will give robustness to storage servers.
Style APA, Harvard, Vancouver, ISO itp.
45

Pajany M. i Zayaraz G. "A Robust Lightweight Data Security Model for Cloud Data Access and Storage". International Journal of Information Technology and Web Engineering 16, nr 3 (lipiec 2021): 39–53. http://dx.doi.org/10.4018/ijitwe.2021070103.

Pełny tekst źródła
Streszczenie:
In this paper, an efficient lightweight cloud-based data security model (LCDS) is proposed for building a secured cloud database with the assistance of intelligent rules, data storage, information collection, and security techniques. The major intention of this study is to introduce a new encryption algorithm to secure intellectual data, proposing a new data aggregation algorithm for effective data storage and improved security, developing an intelligent data merging algorithm for accessing encrypted and original datasets. The major benefit of the proposed model is that it is fast in the encryption process at the time of data storage and reduced decryption time during data retrieval. In this work, the authors proposed an enhanced version of the hybrid crypto algorithm (HCA) for cloud data access and storage. The proposed system provides secured storage for storing data within the cloud.
Style APA, Harvard, Vancouver, ISO itp.
46

Aljumah, Abdullah, Tariq Ahamed Ahanger i Imdad Ullah. "Heterogeneous Blockchain-Based Secure Framework for UAV Data". Mathematics 11, nr 6 (10.03.2023): 1348. http://dx.doi.org/10.3390/math11061348.

Pełny tekst źródła
Streszczenie:
Unmanned aerial vehicles, drones, and internet of things (IoT) based devices have acquired significant traction due to their enhanced usefulness. The primary use is aerial surveying of restricted or inaccessible locations. Based on the aforementioned aspects, the current study provides a method based on blockchain technology for ensuring the safety and confidentiality of data collected by virtual circuit-based devices. To test the efficacy of the suggested technique, an IoT-based application is integrated with a simulated vehicle monitoring system. Pentatope-based elliptic curve encryption and secure hash algorithm (SHA) are employed to provide anonymity in data storage. The cloud platform stores technical information, authentication, integrity, and vehicular responses. Additionally, the Ethbalance MetaMask wallet is used for BCN-based transactions. Conspicuously, the suggested technique aids in the prevention of several attacks, including plaintext attacks and ciphertext attacks, on sensitive information. When compared to the state-of-the-art techniques, the outcomes demonstrate the effectiveness and safety of the suggested method in terms of operational cost (2.95 units), scalability (14.98 units), reliability (96.07%), and stability (0.82).
Style APA, Harvard, Vancouver, ISO itp.
47

Masood, Raziqa, i Q. P. Rana. "Public Auditing for Secure Cloud Storage based on DHT". Journal of University of Shanghai for Science and Technology 23, nr 11 (6.11.2021): 86–98. http://dx.doi.org/10.51201/jusst/21/10853.

Pełny tekst źródła
Streszczenie:
Today cloud computing has been the most popular service enjoyed by people due to the easy maintenance provided by it. Cloud computing is cost-efficient and people pay according to the services they use. Many organizations are using cloud storage and the reason behind it is that the outsourcing services are provided by the cloud computing. Most of people do not trust the legality of the services provided by cloud (CSPs i.e. cloud service providers) because they are afraid of the security breach of their data. The public auditing of the data by their owners is a technique that can maintain the trust of people on cloud services. This research paper is about cloud storage services based on the distributed hash table (DHT).This is required for dynamic auditing of information as this is new two-dimensional data and Third-party Auditor (TPA) is responsible for recording the information to do dynamic auditing and the dimensional data is located at TPA. The computational costs gets reduced when the authorized information is migrated to the two dimensional data and the Cloud service provider shifts it to the TPA DHT has many structural advantages and the services can be updated efficiently. The comparison with the present system is also made and is assured that it is the security system for the cloud storage. To secure the data information by blinding it, random masking is provided as a proof for securing process. The authentication is done via hashing technique and integrity and performance checks are made with this authentication process.
Style APA, Harvard, Vancouver, ISO itp.
48

A.R.Gadekar, Mr, Dr M.V.Sarode i Dr V.M.Thakare. "Cloud Based Secure Storage for Online Examination System". International Journal of Engineering & Technology 7, nr 3.8 (7.07.2018): 74. http://dx.doi.org/10.14419/ijet.v7i3.8.15224.

Pełny tekst źródła
Streszczenie:
As there has been a vast advancement in information and communication technology, there is a need for change in traditional examination system. Traditional examination system is to be replaced by online examination system. A cloud based solution is proposed to tackle the various issues in educational institutions. Here, we propose architecture for an android based examination system using cloud computing concept. In this we attempt to show an applicability, usage of cloud storage in examination management in education. Android is used to simplify the tasks. The thumb verification device is used to authenticate the user. Some encryption techniques are used for providing security to data.
Style APA, Harvard, Vancouver, ISO itp.
49

Gousteris, Solonas, Yoannis C. Stamatiou, Constantinos Halkiopoulos, Hera Antonopoulou i Nikos Kostopoulos. "Secure Distributed Cloud Storage based on the Blockchain Technology and Smart Contracts". Emerging Science Journal 7, nr 2 (14.02.2023): 469–79. http://dx.doi.org/10.28991/esj-2023-07-02-012.

Pełny tekst źródła
Streszczenie:
Objectives: This paper addresses the problem of secure data storage and sharing over cloud storage infrastructures. A secure, distributed cloud storage structure incorporating the blockchain structure is proposed that supports confidentiality, integrity, and availability. Methods/Analysis: The proposed structure combines two well-known technologies: one of them is the Ethereum Blockchain and its Smart Contracts and the other is the RSA encryption and authentication scheme. The Ethereum Blockchain is used as a data structure, which ensures data availability and integrity while RSA provides sensitive data confidentiality and source authentication. Findings: As a result, users of the proposed structure can trust it and be certain that they can securely exchange information through a publicly accessible and shared cloud storage. The application can be used either through a user interface (UI) or a command-line interface (CLI). Novelty /Improvement:The novelty of this work is that the system that is proposed could be used for secure data storage on the cloud as well as for file sharing and authentication verification. Also, secure data storage and file sharing are already offered by the proposed system. Doi: 10.28991/ESJ-2023-07-02-012 Full Text: PDF
Style APA, Harvard, Vancouver, ISO itp.
50

Marwan, Samiha Abdelrahman Mohammed, Ahmed Shawish i Khaled Nagaty. "Utilizing DNA Strands for Secured Data-Hiding with High Capacity". International Journal of Interactive Mobile Technologies (iJIM) 11, nr 2 (11.04.2017): 88. http://dx.doi.org/10.3991/ijim.v11i2.6565.

Pełny tekst źródła
Streszczenie:
There are continuous threats to network technologies due to its rapidly-changing nature, which raises the demand for data-safe transmission. As a result, the need to come up with new techniques for securing data and accommodating the growing quantities of information is crucial. From nature to science, the idea that genes themselves are made of information stimulated the research in molecular deoxyribonucleic acid (DNA). DNA is capable of storing huge amounts of data, which leads to its promising effect in steganography. DNA steganography is the art of using DNA as an information carrier which achieves high data storage capacity as well as high security level. Currently, DNA steganography techniques utilize the properties of only one DNA strand, since the other strand is completely dependent on the first one. This paper presents a DNA-based steganography technique that hides data into both DNA strands with respect to the dependency between the two strands. In the proposed technique, a key of the same length of the reference DNA sequence is generated after using the second DNA strand. The sender sends both the encrypted DNA message and its reference DNA sequence together into a microdot. If the recipient receives this microdot uncontaminated, the sender can safely send the generated key afterwards. The proposed technique doubles the amount of data stored and guarantees a secure transmission process as well, for even if the attacker suspects the first-sent DNA sequence, they will never receive the key, and hence full data extraction is nearly impossible. The conducted experimental study confirms the effectiveness of the proposed.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii