Evolving Cryptographic Approach for Enhancing Security of Resource Constrained Mobile Device Outsourced Data in Cloud Computing
نویسندگان
چکیده
منابع مشابه
An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing
Outsourcing of data into cloud has become an effective trend in modern day computing due to its ability to provide low-cost, pay-as-you-go IT services. Although cloud based services offer many advantages, privacy of the outsourced data is a big concern. To mitigate this concern, it is desirable to outsource sensitive data in an encrypted form but cost of encryption process would increase the he...
متن کاملAnalyzing Data Security for Cloud Computing Using Cryptographic Algorithms
Cloud computing is the next generation architecture, which focuses on IT enterprise, through which potentiality on delivery of services in an infrastructure is increased. By the means of cloud computing investing in new infrastructure, training new personnel and licensing new software descends. It offers the massive storage to the users. It moves the application databases to centralized data ce...
متن کاملAn Efficient Resource Allocation for Processing Healthcare Data in the Cloud Computing Environment
Nowadays, processing large-media healthcare data in the cloud has become an effective way of satisfying the medical userschr('39') QoS (quality of service) demands. Providing healthcare for the community is a complex activity that relies heavily on information processing. Such processing can be very costly for organizations. However, processing healthcare data in cloud has become an effective s...
متن کاملTowards Enhancing Resource Scarce Cloudlet Performance in Mobile Cloud Computing
In recent years, mobile devices such as smart phones, tablets empowered with tremendous technological advancements. Augmenting the computing capability to the distant cloud help us to envision a new computing era named as mobile cloud computing (MCC). However, distant cloud has several limitations such as communication delay and bandwidth which brings the idea of proximate cloud of cloudlet. Cl...
متن کاملData Security and Privacy for Outsourced Data In the Cloud
Although outsourcing data to cloud storage has become popular, the increasing concerns about data security and privacy in the cloud blocks broader cloud adoption. Ensuring data security and privacy, therefore, is crucial for better and broader adoption of the cloud. This tutorial provides a comprehensive analysis of the state-of-the-art in the context of data security and privacy for outsourced...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Scientific Research in Computer Science, Engineering and Information Technology
سال: 2019
ISSN: 2456-3307
DOI: 10.32628/cseit195111