Secured Authorized Data Using Hybrid Encryption in Cloud Computing
نویسندگان
چکیده
منابع مشابه
A Secured and Authorized Data Deduplication in Hybrid Cloud with Public Auditing
The popularity and widespread use of Cloud have brought great convenience for data sharing and data storage. The data sharing with a large number of participants take into account issuers like data integrity, efficiency and privacy of the owner for data. In cloud storage services one critical challenge is to manage ever-increasing volume of data storage in cloud. To make data management more sc...
متن کاملData Integrity Using Encryption in Cloud Computing
Data integrity is an important phase in cloud computing. Since the previous couple of years the protocols that was evoked during this field has reached greater heights.[1] Existing protocols with the assistance of a third-party auditor in an exceedingly previous work, Sebe ́et al propose a data integrity verifying protocol that supports information dynamics[2]. During this paper, we adapt Sebe ́e...
متن کاملAccessing Secured Data in Cloud Computing Environment
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data securit...
متن کاملSecure Data Sharing in Cloud Computing using Hybrid cloud
Cloud computing is fast growing technology that enables the users to store and access their data remotely. Using cloud services users can enjoy the benefits of on-demand cloud applications and data with limited local infrastructure available with them. While accessing the data from cloud, different users may have relationship among them depending on some attributes, and thus sharing of data alo...
متن کاملData Security in Cloud Computing using Encryption and Steganography
Cloud Computing is a technology that readily makes available resources that otherwise may require huge amount of investment. Besides, it increases the availability of resources since anyone can access the data using web. But this advantage comes at a cost. Firstly, the data is uploaded unsecurely which has a high risk of being hacked by some malicious people. Secondly, the data saved at remote ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering Research and Applications
سال: 2017
ISSN: 2248-9622,2248-9622
DOI: 10.9790/9622-0702055658