Encryption Techniques for Cloud Data Confidentiality
نویسندگان
چکیده
منابع مشابه
Encryption and Fragmentation for Data Confidentiality in the Cloud
Cloud computing has emerged as a successful paradigm allowing individual users and well as companies to resort to external providers for storing/processing data or making them available to others. Together with the many benefits, cloud computing introduces however new security and privacy risks. A major issue is due to the fact that the data owner, storing data at external providers, loses cont...
متن کاملConfidentiality without Encryption For Cloud Computational Privacy
Advances in technology has given rise to new computing models where any individual/organization (Cloud Service Consumers here by denoted as CSC's) can outsource their computational intensive tasks on their data to a remote Cloud Service Provider (CSP) for many advantages like lower costs , scalability etc. But such advantages come for a bigger cost “Security and Privacy of data” for this very r...
متن کاملCloud Data Patterns for Confidentiality
Cloud computing enables cost-effective, self-service, and elastic hosting of applications in the Cloud. Applications may be partially or completely moved to the Cloud. When hosting or moving the database layer to the Cloud, challenges such as avoidance of disclosure of critical data have to be faced. The main challenges are handling different levels of confidentiality and satisfying security an...
متن کاملEfficient Cloud Data Confidentiality for DaaS
Privacy is a pinnacle concern of the cloud database model known as “Database as a service (DaaS)”. DaaS is highly appreciated in business community because it saves hardware cost, cost of the technical people required to manage the database and it also saves the license cost of the database. Moreover, it offers reliable services and people can access their data 24 x 7 from anywhere provided the...
متن کاملData confidentiality in cloud-based pervasive system
Data condentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing capabilities, smart devices need to rely on cloud servers for heavy-duty computations such as matrix multiplication. Conventional security mechanisms such as public key encryption is...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Grid and Distributed Computing
سال: 2014
ISSN: 2005-4262,2005-4262
DOI: 10.14257/ijgdc.2014.7.4.02