نتایج جستجو برای: cloud server

تعداد نتایج: 135509  

2016
V. Prasath R. Buvanesvari

Cloud computing is a recently developed with a new technology for complex systems with massivescale services sharing among numerous users. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Federated Identity Management is a secure single sign-on process between each other and it can enable the portability...

2016
Rodolfo Valiente Marcelo T. Sadaike José C. Gutiérrez Daniel F. Soriano Graça Bressan Wilson V. Ruggiero

A process for accurate text recognition of generic identification documents (ID) over cloud computing is presented. It consists of two steps, first, a smartphone camera takes a picture of the ID, which is sent to a cloud server; second, the image is processed by the server and the results are sent back to the smartphone. In the cloud server, image rectification, text detections and word recogni...

2011
Daniel A. Rodríguez-Silva Francisco Javier González-Castaño Lilian Adkinson-Orellana A. Fernández-Cordeiro Juan Ramón Troncoso-Pastoriza David González-Martínez

Cloud security comprises access control and end-to-end security based on flow or message-level privacy. In some applications, in which all processing takes place at the client side and the Cloud simply handles data storage (e.g. Google Docs), on-line data encryption/decryption guarantees privacy. However, when a service requires server processing (e.g. spreadsheets), privacy must necessarily re...

2017
Dr. B. R. VIKRAM

With the popularity of outsourcing facts to the cloud, it's far vital to shield the privacy of facts and enable the cloud server to effortlessly control the data at the same time. Under such needs, reversible statistics hiding in encrypted photos (RDH-EI) attracts increasingly more researchers’ attention. In this paper, we suggest a singular framework for RDH-EI primarily based on reversible ph...

2018
Andreea B. Alexandru Manfred Morari George J. Pappas

This paper explores the privacy of cloud outsourced Model Predictive Control (MPC) for a linear system with input constraints. In our cloud-based architecture, a client sends her private states to the cloud who performs the MPC computation and returns the control inputs. In order to guarantee that the cloud can perform this computation without obtaining anything about the client’s private data,...

2016
Li Yu Junyao Ye Kening Liu

Cloud storage can satisfy the demand of accessing data at anytime, anyplace. In cloud storage, only when the users can verify that the cloud storage server possesses the data correctly, users shall feel relax to use cloud storage. Provable data possession(PDP) makes it easy for a third party to verify whether the data is integrity in the cloud storage server. We analyze the existing PDP schemes...

Journal: :Symmetry 2016
Sungju Lee Taikyeong T. Jeong

A fundamental key for enterprise users is a cloud-based parameter-driven statistical service and it has become a substantial impact on companies worldwide. In this paper, we demonstrate the statistical analysis for some certain criteria that are related to data and applied to the cloud server for a comparison of results. In addition, we present a statistical analysis and cloud-based resource al...

2014
Debabrata Sarddar Sandip Roy Rajesh Bose

New generation of technology is inclining towards the uphill cloud computing technology. Many users and organizations could not able to embrace cloud services blindly because of their uncovering security issue for managing huge amount of data. Data is transmigrated between different servers which are disseminated globally. In cloud computing large number of cloud user should be cognizant of the...

2013
B. Anjani Kumar K. Hari C. Subash Chandra

Cloud users store their data in the cloud environment which is privileged by the service provider. Cloud users can access their cloud storage. Here we propose a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computati...

2013
Lei Wei Michael K. Reiter

Cloud storage, and more specifically the encryption of file contents to protect them in the cloud, can interfere with access to these files by partially trusted third-party service providers and customers. To support such access for pattern-matching applications (e.g., malware scanning), we present a protocol that enables a client authorized by the data owner to evaluate a deterministic finite ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید