80,381 research outputs found

    Searchable Symmetric Encryption and its applications

    Get PDF
    In the age of personalized advertisement and online identity profiles, people’s personal information is worth more to corporations than ever. Storing data in the cloud is increasing in popularity due to bigger file sizes and people just storing more information digitally. The leading cloud storage providers require insight into what users store on their servers. This forces users to trust their cloud storage provider not to misuse their information. This opens the possibility that private information is sold to hackers or is made publicly available on the internet. However, the more realistic case is that the service provider sells or misuses your metadata for use in personalized advertisements or other, less apparent purposes. This thesis will explore Searchable Sym- metric Encryption (SSE) algorithms and how we can utilize them to make a more secure cloud storage serviceMasteroppgave i informatikkINF399MAMN-PROGMAMN-IN

    Secure Multilevel Data Authentication System in Cloud Environment

    Get PDF
    Dynamic Proof of Storage is a useful cryptographic primitive that enables a user to check the integrity of outsourced files and to efficiently update the files in a cloud server. Though researchers have planned several dynamic PoS schemes in single user environments, the matter in multi-user environments has not been investigated sufficiently. A sensible multi-user cloud storage system wants the secure client-side cross-user de-duplication technique, that permits a user to skip the uploading method and procure the possession of the files now, once alternative house owners of an equivalent files have uploaded them to the cloud server. To the simplest of our data, none of the present dynamic PoS will support this system. during this paper, we have a tendency to introduce the conception of de-duplicatable dynamic proof of storage associated propose an economical construction referred to as DeyPoS, to realize dynamic PoS and secure cross-user duplication, at the same time. Considering the challenges of structure diversity and personal tag generation, we have a tendency to exploit a unique tool referred to as Homomorphic Authenticated Tree (HAT). We have a tendency to prove the protection of our construction, and therefore the theoretical analysis and experimental results show that our construction is economical in follow

    Third Party Risk Management and Cyber Supply Chain Risk Management

    Get PDF
    Today’s business environment continues to be a challenge. Businesses whether small, or large leverage third-party vendors to provide critical services like data handling (security, transmitting, and storage), cloud storage/applications, and systems security monitoring. Each business must ask themselves a few simple questions about one of their most valuable assets “Data”. If or when it leaves your secure working environment: How secure is your customer data in transit and storage? Do your third-party vendors handle your “critical information”? Provide a secure environment for processing? Comply with a proven Cyber Security Framework? Perform a “Due Diligence” on-boarding step for the Nth vendors (how many vendors handles your specific data) in your cyber supply chain? Follow security agreements and service level agreements catered to information security? Ensure data privacy is an important element of their InfoSec Program? It is more important than ever for businesses that handle proprietary information, personal identifiable information and protected health information to understand the threats and risk management practices to ensure “Critical Information” is secure. These questions and more will be covered in this webinar

    Облачное хранилище

    Full text link
    Несмотря на многочисленные преимущества облачного хранилища, защита данных по-прежнему является уязвимостью. В этой статье рассматриваются несколько способов защиты личных данных на облачном сервере. Данные могут быть защищены от изменений, посторонними лицами с помощью облачной системы хранения, где данные шифруются и поиск осуществляется по ключевому слову. В статье исследуется надежная и безопасная схема облачного хранилища с использованием нескольких обслуживающих компаний, и описывается архитектура облачной системы хранения на основе атрибутов с безопасным происхождением.Despite the many benefits of cloud storage, data protection is still a vulnerability. In this article, several ways of protection personal data on a cloud server are conceded. Data can be protected from alteration by unauthorized people using a cloud storage system, where data is encrypted and searched for using a keyword. In this article, a reliable and secure cloud storage schema using multiple service providers is examined and the system architecture of an attribute-based cloud storage system with secure provenance is described

    A New Algorithm Technique for Protection Secure Personal Key and Cloud Storage

    Get PDF
    Abstract People can only enjoy the completed advantages over astronaut computing condition we may address the entirely actual privateness or safety concerns that arrive with storing touchy private facts into databases and applications measure around the Internet. Cloud computing is the class of a computing rule the place the enormous dynamic up to expectation IT helps as like a "service" the usage of pc and web applied sciences is transferred in imitation of much out of doors customers. The proposed method offers three-level protection the usage of AES algorithm and a secure personal key. The approach also provides data tankage privateness safety because of huge groups yet the discovery about sensitive facts tankage leaks. Our order gives some on the privateness practices ancient within wind computing services

    Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Based Encryption

    Get PDF
    Nowadays regularly use cloud services in our daily life.There are various services provided by cloud such as a service, Platform as a service, and Infrastructure asa service. The used to keep our data,documents, and files on cloud. The data that store may be Personal, Private, secret data. So must be very sure that whatever the cloud service we use that must be secure. Cloud computing Provides number of services to client over internet. Storage service isone ofthe important services that people used now days for storing data on network so that they can access their data from anywhere and anytime. With the benefit of storage service there is an issue of security. To overcome security problem the proposed system contain two levels of security and to reduce the unwanted storage space de-duplication[1,2] technique is involved. To increase the level of security one technique is a session password.Session passwords can be used only once and every time a new password is generated.To protect the confidentiality of sensitive data while supporting de-duplication[1,2]the convergent encryption technique has been proposed to encrypt the data before outsourcing,Symmetrickey algorithm uses same key for both encryption and decryption.In this paper,I will focus on session based authentication for both encryptions for files and duplication check for reduce space of storage on cloud

    A Secure Cloud Computing Model based on Data Classification

    Get PDF
    AbstractIn cloud computing systems, the data is stored on remote servers accessed through the internet. The increasing volume of personal and vital data, brings up more focus on storing the data securely. Data can include financial transactions, important documents, and multimedia contents. Implementing cloud computing services may reduce local storage reliance in addition to reducing operational and maintenance costs. However, users still have major security and privacy concerns about their outsourced data because of possible unauthorized access within the service providers. The existing solutions encrypt all data using the same key size without taking into consideration the confidentiality level of data which in turn will increase the cost and processing time. In this research, we propose a secure cloud computing model based on data classification. The proposed cloud model minimizes the overhead and processing time needed to secure data through using different security mechanisms with variable key sizes to provide the appropriate confidentiality level required for the data. The proposed model was tested with different encryption algorithms, and the simulation results showed the reliability and efficiency of the proposed framework
    corecore