An Efficient Scheme of Cloud Data Assured Deletion

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Retrieval of Cloud Data using ECIES Scheme

Cloud Computing is an important field area for the access of information over internet. On one hand cloud computing provides efficient use of storage but the chances of accessing un-authorized data also increase. Although there are various techniques implemented for the retrieval of data from the cloud, but the technique implemented provides less security and computational time and storage. Hen...

متن کامل

Policy Based File Assured Deletion with Secure Overlay Cloud Storage

The outsource data backup to third-party cloud storage services so as to reduce data management costs, security concerns arise in terms of ensuring the privacy and integrity of out-sourced data. Design Policy Base a practical, implementable, and readily deployable cloud storage system that focuses on protecting deleted data with Policy Based file secured deletion. Policy Base is built upon stan...

متن کامل

Cloud Storage with Improved Access Control and Assured Deletion

Providing secure and efficient access to large scale outsourced data is an important issue of cloud computing. In this paper, a mechanism FADE, a secure overlay cloud storage system, which will guarantee assured file deletion and improved access control for outsourced data is proposed. Cryptographic approach is used for storing and managing data..

متن کامل

FADE: Secure Overlay Cloud Storage with File Assured Deletion

While we can now outsource data backup to third-party cloud storage services so as to reduce data management costs, security concerns arise in terms of ensuring the privacy and integrity of outsourced data. We design FADE, a practical, implementable, and readily deployable cloud storage system that focuses on protecting deleted data with policy-based file assured deletion. FADE is built upon st...

متن کامل

Assured Cloud-Based Data Analysis with ClusterBFT

The shift to cloud technologies is a paradigm change that offers considerable financial and administrative gains. However governmental and business institutions wanting to tap into these gains are concerned with security issues. The cloud presents new vulnerabilities and is dominated by new kinds of applications, which calls for new security solutions. Intuitively, Byzantine fault tolerant (BFT...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mobile Networks and Applications

سال: 2020

ISSN: 1383-469X,1572-8153

DOI: 10.1007/s11036-019-01497-z