Achieving an effective, confidentiality and integrity of data in cloud computing

被引:0
|
作者
Mahmood, Ghassan Sabeeh [1 ,2 ]
Huang, Dong Jun [1 ]
Jaleel, Baidaa Abdulrahman [2 ]
机构
[1] School of Information Science and Engineering, Central South University, Changsha, Hunan,410083, China
[2] Computer Science Department, College of Science, University of Diyala, Iraq
关键词
21;
D O I
10.6633/IJNS.201903 21(2).17
中图分类号
学科分类号
摘要
引用
收藏
页码:326 / 332
相关论文
共 50 条
  • [21] An Algorithm to Enhance Data Integrity in Cloud Computing
    Mothlabeng, Moloko P.
    Mathonsi, Topside E.
    Muchenje, Tonderai
    Du Plessis, Deon P.
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 418 - 424
  • [22] Data Integrity and Privacy Model in Cloud Computing
    Al-Jaberi, Mohammed Faez
    Zainal, Anazida
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 280 - 284
  • [23] Batch verification of the data integrity in cloud computing
    Luo, Wenjun
    Liu, Lu
    Yuan, Shumei
    Zhang, Xiaofang
    International Journal of Digital Content Technology and its Applications, 2012, 6 (15) : 373 - 380
  • [24] Ensuring Confidentiality of Healthcare Data using Fragmentation in Cloud Computing
    Andreas, Andreou
    Mavromoustakis, Constandinos X.
    Batalla, Jordi Mongay
    Markakis, Evangelos
    Mastorakis, George
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 1991 - 1996
  • [25] K-NN Classifier for Data Confidentiality in Cloud Computing
    Zardari, Munwar Ali
    Jung, Low Tang
    Zakaria, Nordin
    2014 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2014,
  • [26] Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing
    Ghimes, Ana-Maria
    Patriciu, Victor Valeriu
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, (SECITC 2016), 2016, 10006 : 274 - 285
  • [27] Cloud Audit: A Data Integrity Verification Approach for Cloud Computing
    Saxena, Rajat
    Dey, Somnath
    TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 142 - 151
  • [28] Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment
    Rajkumar, V
    Prakash, M.
    Vennila, V.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (02): : 779 - 793
  • [29] Data Confidentiality and Integrity Verification using User Authenticator scheme in cloud
    Nirmala, V.
    Sivanandhan, R. K.
    Lakshmi, R. Shanmuga
    2013 IEEE INTERNATIONAL CONFERENCE ON GREEN HIGH PERFORMANCE COMPUTING (ICGHPC), 2013,
  • [30] Secure data sharing with confidentiality, integrity and access control in cloud environment
    Rajkumar V.
    Prakash M.
    Vennila V.
    Computer Systems Science and Engineering, 2021, 40 (02): : 779 - 793