نتایج جستجو برای: cloud server

تعداد نتایج: 135509  

2018
Wai Kit Wong Kwok-Wai Wong Ho-Yin Yue

Data confidentiality is concerned in database-as-a-service (DBaaS) model. The cloud server should not have access to user’s plain data. Data is encrypted before they are stored in cloud database. Query computation over encrypted data by the server is not straight-forward. Many research works have been done on this problem. A common goal is to let the server obtain the selection result without l...

2013
Argha Roy Diptam Dutta

In cloud computing the major problem area is fault tolerance. When many clients request the server simultaneously, server is overloaded which causes fault. In our approach the load balancing technique is used to avoid fault. There are various fault tolerance techniques in existing cloud computing. They are self healing, job migration, static load balancing and replication. There are some drawba...

2016
K. Raghuveer

Cloud computing has become an integral part of IT services, storing the application softwares and databases in large centralized shared data servers. Since it’s a shared platform, the data and services may not be fully trust worthy. In this work, we have implemented an efficient security model that ensures the data integrity of stored data in cloud servers. The computational load of data verifi...

2014
R. Murugesan C. Elango S. Kannan

Cloud computing is a new trend for computing resource allocation. Successful development of cloud computing paradigm necessitates accurate performance evaluation of cloud data centers. The computing resource allocation and performance managing have been one of the most important aspects of cloud computing. In this model, the resource allocation are modeled as queues and the virtual machines are...

Journal: :IACR Cryptology ePrint Archive 2017
Reyhaneh Rabaninejad Maryam Rajabzadeh Asaar Mahmoud Ahmadian-Attari Mohammad Reza Aref

In cloud storage service, public auditing mechanisms allow a third party to verify integrity of the outsourced data on behalf of data users without the need to retrieve data from the cloud server. Recently, Shen et al. proposed a new lightweight and privacy preserving cloud data auditing scheme which employs a third party medium to perform time-consuming operations on behalf of users. The autho...

Journal: :J. Internet Serv. Inf. Secur. 2014
Keying Li Jianfeng Wang Yinghui Zhang Hua Ma

Cloud computing has come into our daily lives. The cloud server can provide powerful computing and storage capability as services. Since the decryption algorithm for attribute-based encryption needs a lot of computations, so with the help of cloud servers many attribute-based encryption schemes are designed for practical applications in cloud computing. To the best of our knowledge there does n...

2011
Mark Wallis Frans A. Henskens Michael Hannaford

From an consumer perspective the Cloud is opaque. Online storage and the rise of web applications are changing the way users work. There continues though to be no distinction from a user experience point of view between accessing a Cloud-based application and accessing a web application deployed on a classic server. We propose a new paradigm for online application development which takes the be...

Journal: :CoRR 2014
Gita Shah Annappa K. C. Shet

Cloud has been a computational and storage solution for many data centric organizations. The problem today those organizations are facing from the cloud is in data searching in an efficient manner. A framework is required to distribute the work of searching and fetching from thousands of computers. The data in HDFS is scattered and needs lots of time to retrieve. The major idea is to design a w...

2014
Gita Shah K. C. Shet

Cloud has been a computational and storage solution for many data centric organizations. The problem today those organizations are facing from the cloud is in data searching in an efficient manner. A framework is required to distribute the work of searching and fetching from thousands of computers. The data in HDFS is scattered and needs lots of time to retrieve. The major idea is to design a w...

Journal: :Future Generation Comp. Syst. 2014
Jin Li Xiaofeng Chen Qiong Huang Duncan S. Wong

Secure provenance that records the ownership and process history of data objects is vital to the success of data forensics in cloud computing. In this paper, we propose a new secure provenance scheme based on group signature and attribute-based signature techniques. The proposed provenance scheme provides confidentiality on sensitive documents stored in a cloud, unforgeability of the provenance...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید