نتایج جستجو برای: cloud server
تعداد نتایج: 135509 فیلتر نتایج به سال:
Cloud computing is a recently developed with a new technology for complex systems with massivescale services sharing among numerous users. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Federated Identity Management is a secure single sign-on process between each other and it can enable the portability...
A process for accurate text recognition of generic identification documents (ID) over cloud computing is presented. It consists of two steps, first, a smartphone camera takes a picture of the ID, which is sent to a cloud server; second, the image is processed by the server and the results are sent back to the smartphone. In the cloud server, image rectification, text detections and word recogni...
Cloud security comprises access control and end-to-end security based on flow or message-level privacy. In some applications, in which all processing takes place at the client side and the Cloud simply handles data storage (e.g. Google Docs), on-line data encryption/decryption guarantees privacy. However, when a service requires server processing (e.g. spreadsheets), privacy must necessarily re...
With the popularity of outsourcing facts to the cloud, it's far vital to shield the privacy of facts and enable the cloud server to effortlessly control the data at the same time. Under such needs, reversible statistics hiding in encrypted photos (RDH-EI) attracts increasingly more researchers’ attention. In this paper, we suggest a singular framework for RDH-EI primarily based on reversible ph...
This paper explores the privacy of cloud outsourced Model Predictive Control (MPC) for a linear system with input constraints. In our cloud-based architecture, a client sends her private states to the cloud who performs the MPC computation and returns the control inputs. In order to guarantee that the cloud can perform this computation without obtaining anything about the client’s private data,...
Cloud storage can satisfy the demand of accessing data at anytime, anyplace. In cloud storage, only when the users can verify that the cloud storage server possesses the data correctly, users shall feel relax to use cloud storage. Provable data possession(PDP) makes it easy for a third party to verify whether the data is integrity in the cloud storage server. We analyze the existing PDP schemes...
A fundamental key for enterprise users is a cloud-based parameter-driven statistical service and it has become a substantial impact on companies worldwide. In this paper, we demonstrate the statistical analysis for some certain criteria that are related to data and applied to the cloud server for a comparison of results. In addition, we present a statistical analysis and cloud-based resource al...
New generation of technology is inclining towards the uphill cloud computing technology. Many users and organizations could not able to embrace cloud services blindly because of their uncovering security issue for managing huge amount of data. Data is transmigrated between different servers which are disseminated globally. In cloud computing large number of cloud user should be cognizant of the...
Cloud users store their data in the cloud environment which is privileged by the service provider. Cloud users can access their cloud storage. Here we propose a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computati...
Cloud storage, and more specifically the encryption of file contents to protect them in the cloud, can interfere with access to these files by partially trusted third-party service providers and customers. To support such access for pattern-matching applications (e.g., malware scanning), we present a protocol that enables a client authorized by the data owner to evaluate a deterministic finite ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید