An Efficient Scheme of Cloud Data Assured Deletion
نویسندگان
چکیده
منابع مشابه
An Efficient Retrieval of Cloud Data using ECIES Scheme
Cloud Computing is an important field area for the access of information over internet. On one hand cloud computing provides efficient use of storage but the chances of accessing un-authorized data also increase. Although there are various techniques implemented for the retrieval of data from the cloud, but the technique implemented provides less security and computational time and storage. Hen...
متن کاملPolicy Based File Assured Deletion with Secure Overlay Cloud Storage
The outsource data backup to third-party cloud storage services so as to reduce data management costs, security concerns arise in terms of ensuring the privacy and integrity of out-sourced data. Design Policy Base a practical, implementable, and readily deployable cloud storage system that focuses on protecting deleted data with Policy Based file secured deletion. Policy Base is built upon stan...
متن کاملCloud Storage with Improved Access Control and Assured Deletion
Providing secure and efficient access to large scale outsourced data is an important issue of cloud computing. In this paper, a mechanism FADE, a secure overlay cloud storage system, which will guarantee assured file deletion and improved access control for outsourced data is proposed. Cryptographic approach is used for storing and managing data..
متن کاملFADE: Secure Overlay Cloud Storage with File Assured Deletion
While we can now outsource data backup to third-party cloud storage services so as to reduce data management costs, security concerns arise in terms of ensuring the privacy and integrity of outsourced data. We design FADE, a practical, implementable, and readily deployable cloud storage system that focuses on protecting deleted data with policy-based file assured deletion. FADE is built upon st...
متن کاملAssured Cloud-Based Data Analysis with ClusterBFT
The shift to cloud technologies is a paradigm change that offers considerable financial and administrative gains. However governmental and business institutions wanting to tap into these gains are concerned with security issues. The cloud presents new vulnerabilities and is dominated by new kinds of applications, which calls for new security solutions. Intuitively, Byzantine fault tolerant (BFT...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mobile Networks and Applications
سال: 2020
ISSN: 1383-469X,1572-8153
DOI: 10.1007/s11036-019-01497-z