Achieving an effective, confidentiality and integrity of data in cloud computing

被引:0
|
作者
Mahmood, Ghassan Sabeeh [1 ,2 ]
Huang, Dong Jun [1 ]
Jaleel, Baidaa Abdulrahman [2 ]
机构
[1] School of Information Science and Engineering, Central South University, Changsha, Hunan,410083, China
[2] Computer Science Department, College of Science, University of Diyala, Iraq
关键词
21;
D O I
10.6633/IJNS.201903 21(2).17
中图分类号
学科分类号
摘要
引用
收藏
页码:326 / 332
相关论文
共 50 条
  • [1] The Method of Ensuring Confidentiality and Integrity Data in Cloud Computing
    Rukavitsyn, Andrey N.
    Borisenko, Konstantin A.
    Holod, Ivan I.
    Shorov, Andrey V.
    [J]. PROCEEDINGS OF 2017 XX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2017, : 272 - 274
  • [2] A method for achieving provable data integrity in cloud computing
    Li, Aiping
    Tan, Shuang
    Jia, Yan
    [J]. JOURNAL OF SUPERCOMPUTING, 2019, 75 (01): : 92 - 108
  • [3] A method for achieving provable data integrity in cloud computing
    Aiping Li
    Shuang Tan
    Yan Jia
    [J]. The Journal of Supercomputing, 2019, 75 : 92 - 108
  • [4] Integrity and Confidentiality in Cloud Outsourced Data
    Rady, Mai
    Abdelkader, Tamer
    Ismail, Rasha
    [J]. AIN SHAMS ENGINEERING JOURNAL, 2019, 10 (02) : 275 - 285
  • [5] PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing
    Sukumaran, Sreeja Cherillath
    Misbahuddin, Mohammed
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (04) : 426 - 435
  • [6] An Effective Integrity Verification Scheme for Ensuring Data Integrity in Cloud Computing
    Kamboj, Minakshi
    Rana, Sanjeev
    [J]. INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, IBICA 2021, 2022, 419 : 42 - 54
  • [7] Empowering Users of Cloud Computing on Data Confidentiality
    Khan, Khaled Md
    Shaheen, Mahboob
    [J]. 2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2014, : 272 - 274
  • [8] Data Obfuscation for Privacy and Confidentiality in Cloud Computing
    Khan, Khaled M.
    Shaheen, Mahboob
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY - COMPANION (QRS-C 2015), 2015, : 195 - 196
  • [9] Data confidentiality using fragmentation in cloud computing
    Hudic, Aleksandar
    Islam, Shareeful
    Kieseberg, Peter
    Rennert, Sylvi
    Weippl, Edgar R.
    [J]. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2013, 9 (01) : 37 - +
  • [10] A Survey on Data Confidentiality and Privacy in Cloud Computing
    Aloraini, Afnan
    Hammoudeh, Mohammad
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,