Evolving Cryptographic Approach for Enhancing Security of Resource Constrained Mobile Device Outsourced Data in Cloud Computing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing

Outsourcing of data into cloud has become an effective trend in modern day computing due to its ability to provide low-cost, pay-as-you-go IT services. Although cloud based services offer many advantages, privacy of the outsourced data is a big concern. To mitigate this concern, it is desirable to outsource sensitive data in an encrypted form but cost of encryption process would increase the he...

متن کامل

Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms

Cloud computing is the next generation architecture, which focuses on IT enterprise, through which potentiality on delivery of services in an infrastructure is increased. By the means of cloud computing investing in new infrastructure, training new personnel and licensing new software descends. It offers the massive storage to the users. It moves the application databases to centralized data ce...

متن کامل

An Efficient Resource Allocation for Processing Healthcare Data in the Cloud Computing Environment

Nowadays, processing large-media healthcare data in the cloud has become an effective way of satisfying the medical userschr('39') QoS (quality of service) demands. Providing healthcare for the community is a complex activity that relies heavily on information processing. Such processing can be very costly for organizations. However, processing healthcare data in cloud has become an effective s...

متن کامل

Towards Enhancing Resource Scarce Cloudlet Performance in Mobile Cloud Computing

In recent years, mobile devices such as smart phones, tablets empowered with tremendous technological advancements. Augmenting the computing capability to the distant cloud help us to envision a new computing era named as mobile cloud computing (MCC). However, distant cloud has several limitations such as communication delay and bandwidth which brings the idea of proximate cloud of cloudlet. Cl...

متن کامل

Data Security and Privacy for Outsourced Data In the Cloud

Although outsourcing data to cloud storage has become popular, the increasing concerns about data security and privacy in the cloud blocks broader cloud adoption. Ensuring data security and privacy, therefore, is crucial for better and broader adoption of the cloud. This tutorial provides a comprehensive analysis of the state-of-the-art in the context of data security and privacy for outsourced...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Scientific Research in Computer Science, Engineering and Information Technology

سال: 2019

ISSN: 2456-3307

DOI: 10.32628/cseit195111