|
|
|
Mohan Naik Ramachandra, Madala Srinivasa Rao, Wen Cheng Lai, Bidare Divakarachari Parameshachari, Jayachandra Ananda Babu and Kivudujogappa Lingappa Hemalatha
In recent decades, big data analysis has become the most important research topic. Hence, big data security offers Cloud application security and monitoring to host highly sensitive data to support Cloud platforms. However, the privacy and security of bi...
ver más
|
|
|
|
|
|
|
Ali Eghmazi, Mohammadhossein Ataei, René Jr Landry and Guy Chevrette
The Internet of Things (IoT) is a technology that can connect billions of devices or ?things? to other devices (machine to machine) or even to people via an existing infrastructure. IoT applications in real-world scenarios include smart cities, smart hou...
ver más
|
|
|
|
|
|
|
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove...
ver más
|
|
|
|
|
|
|
Somchai Prakancharoen
Pág. pp. 136 - 151
The objective of this research was to suggest some simple solution to increase database manipulation security. Based on advantage of Homomorphic encryption, user?s data in database is always encrypted by Homomorphic encryption algorithm such as Paillier....
ver más
|
|
|
|
|
|
|
????????? ???????? ?????
Pág. 5 - 14
The subject matter of the study is the encryption of information in cloud data computation and storage. Cloud technologies enable reducing the cost of IT infrastructure significantly and responding to changes in computing needs flexibly. In this case, th...
ver más
|
|
|
|
|
|
|
Tao Feng, Dewei Wang and Renbin Gong
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine...
ver más
|
|
|
|
|
|
|
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi...
ver más
|
|
|
|
|
|
|
Meijuan Huang, Yutian Liu, Bo Yang, Yanqi Zhao and Mingrui Zhang
Revocable attribute-based encryption (RABE) provides greater flexibility and fine-grained access control for data sharing. However, the revocation process for most RABE schemes today is performed by the cloud storage provider (CSP). Since the CSP is an h...
ver más
|
|
|
|
|
|
|
Tse-Chuan Hsu
With the rapid development of the Internet of Things (IoT) in recent years, many IoT devices use communication systems to transmit data. Data packets are inevitably at risk of tampering during data transmission, which can lead to information errors and d...
ver más
|
|
|
|
|
|
|
Mira Lee and Minhye Seo
Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data deduplication technology is utilized to decrease storage space and bandwidth requirements. This...
ver más
|
|
|
|
|
|
|
Moatsum Alawida, Je Sen Teh and Wafa? Hamdan Alshoura
Drone-based surveillance has become widespread due to its flexibility and ability to access hazardous areas, particularly in industrial complexes. As digital camera capabilities improve, more visual information can be stored in high-resolution images, re...
ver más
|
|
|
|
|
|
|
Saci Medileh, Abdelkader Laouid, Mohammad Hammoudeh, Mostefa Kara, Tarek Bejaoui, Amna Eleyan and Mohammed Al-Khalidi
In today?s hyperconnected world, the Internet of Things and Cloud Computing complement each other in several areas. Cloud Computing provides IoT systems with an efficient and flexible environment that supports application requirements such as real-time c...
ver más
|
|
|
|
|
|
|
Fatma S. Alrayes, Saud S. Alotaibi, Khalid A. Alissa, Mashael Maashi, Areej Alhogail, Najm Alotaibi, Heba Mohsen and Abdelwahed Motwakel
Unmanned Aerial Vehicles (UAVs), or drones, provided with camera sensors enable improved situational awareness of several emergency responses and disaster management applications, as they can function from remote and complex accessing regions. The UAVs c...
ver más
|
|
|
|
|
|
|
Ibrahim Abunadi, Hanan Abdullah Mengash, Saud S. Alotaibi, Mashael M. Asiri, Manar Ahmed Hamza, Abu Sarwar Zamani, Abdelwahed Motwakel and Ishfaq Yaseen
Recent developments of semiconductor and communication technologies have resulted in the interconnection of numerous devices in offering seamless communication and services, which is termed as Internet of Everything (IoE). It is a subset of Internet of T...
ver más
|
|
|
|
|
|
|
Weijing You, Lei Lei, Bo Chen and Limin Liu
By only storing a unique copy of duplicate data possessed by different data owners, deduplication can significantly reduce storage cost, and hence is used broadly in public clouds. When combining with confidentiality, deduplication will become problemati...
ver más
|
|
|
|
|
|
|
Siti Dhalila Mohd Satar, Masnida Hussin, Zurina Mohd Hanapi and Mohamad Afendee Mohamed
Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data acces...
ver más
|
|
|
|
|
|
|
Ibtisam A. Aljazaery,Haider Th. Salim Alrikabi,Mustafa Rabea Aziz
Pág. pp. 34 - 47
One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an algorithm...
ver más
|
|
|
|
|
|
|
Giao N. Pham, Son T. Ngo, Anh N. Bui, Dinh V. Tran, Suk-Hwan Lee and Ki-Ryong Kwon
In recent years, GIS (Geographical Information System) vector maps are widely used in everyday life, science, and the military. However, the production process of vector maps is expensive, and a large volume of vector map data is easily stolen and illega...
ver más
|
|
|
|
|
|
|
K.Ruben Raju,Danekula Rajya Lakshmi,Prof.Dr.G.Manoj Someswar
The authors have plagiarized part of a paper that had already appeared in IEEE Transactions on Cloud Computing, 1?1. doi:10.1109/tcc.2016.2545668. One of the conditions of submission of a paper for publication is that authors declare explicitly that thei...
ver más
|
|
|
|
|
|
|
Balaji Chandrasekaran,Ramadoss Balakrishnan,Yasuyuki Nogami
Pág. 75 - 81
Wireless Body Area Networks (WBANs) play an important role in healthcare system by enabling medical experts to guide patients without measuring face-to-face. The unauthorized access of medical data from WBAN controller as well as the unreliable data comm...
ver más
|
|
|
|