نتایج جستجو برای: outsourced data

تعداد نتایج: 2411127  

2010

In the past few years, outsourcing private data to untrusted servers has become an important challenge. This raises severe questions concerning the security and privacy of the data on the external storage. In this paper we consider a scenario where multiple clients want to share data on a server, while hiding all access patterns. We propose here a first solution to this problem based on Oblivio...

2011
D. Srinivas

-The Cloud Computing is the new vision of computing utility, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or cloud provider interaction. Cloud computing technologies can be implemented in a wide variety of architectures, under different service and deployment models, and can coexist wit...

Journal: :IJESDF 2013
Youwen Zhu Rui Xu Tsuyoshi Takagi

In cloud computing, secure analysis on outsourced encrypted data is a significant topic. As a frequently used query for online applications, secure k-nearest neighbours (k-NN) computation on encrypted cloud data has received much attention, and several solutions for it have been put forward. However, most existing schemes assume the query users are fully trusted and all query users know the ent...

2014
Ka Yang Daji Qiao Jinsheng Zhang Wensheng Zhang

In outsourced data services, revealing users’ data access pattern may lead to the exposure of a wide range of sensitive information even if data is encrypted. Oblivious RAM has been a well-studied provable solution to access pattern preservation. However, it is not resilient to attacks towards data integrity from the users or the server. In this paper, we study the problem of protecting access ...

2014
Swarup kshatriya

A model by which information technology services being delivered is resources are retrieved from the internet through web-based tools and applications, instead of direct connection to a server. The Data and software packages are stored in servers. However, cloud computing structure allows access to information as long as an electronic device has access to the web. In this technology users have ...

2014
Priyanka Khandelwal Rakesh Sharma

Now a days we can outsource data backups offsite to third-party cloud storage services(Jelastic cloud) by which we can reduce data management costs. However, we need to provide security guarantees for the outsourced data, maintained by third parties. In this paper we design and implement FADE, a secure overlay cloud storage system which is able to achieve fine-grained, policy-based access contr...

2013
Javed Iqbal Rodina Ahmad Muhammad Asim Noor

The number of IT projects outsourced for software development is increasing day by day as outsourcing is anticipated to provide substantial benefits and the organizations which outsource the projects have certain constraints. But unfortunately, a considerable number of the projects which are outsourced for development are failed in realizing the estimated results. The failure reasons are often ...

2017
MARCUS BRANDENBURGER CHRISTIAN CACHIN NIKOLA KNEŽEVIĆ

More and more data is outsourced to the cloud, and collaborating on a shared resource using cloud services has become easier than ever. Programmers work together on online source code repositories, global project teams produce technical deliverables, and friends share their photo albums. Nevertheless, the clients need to trust the cloud provider as they rely on it for the confidentiality and co...

Journal: :IACR Cryptology ePrint Archive 2013
Mohammad Etemad Alptekin Küpçü

In an outsourced database scheme, the data owner delegates the data management tasks to a remote service provider. At a later time, the remote service is supposed to answer any query on the database. The essential requirements are ensuring the data integrity and authenticity with efficient mechanisms. Current approaches employ authenticated data structures to store security information, generat...

2017
Jinsheng Zhang Qiumao Ma Wensheng Zhang Daji Qiao

This paper proposes MSKT-ORAM, an efficient multiple server ORAM construction, to protect a client’s access pattern to outsourced data. MSKT-ORAM organizes each of the server storage as a k-ary tree and adopts XOR based PIR and a novel delayed eviction technique to optimize both the data query and data eviction process. MSKT-ORAM is proved to protect the data access pattern privacy at a failure...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید