A coherent dynamic remote integrity check on cloud data utilizing homomorphic cryptosystem

Author(s):  
Divya Wadhwa ◽  
Poonam Dabas
2015 ◽  
Vol 23 (4) ◽  
pp. 471-508 ◽  
Author(s):  
Shiuan-Tzuo Shen ◽  
Wen-Guey Tzeng
Keyword(s):  

2019 ◽  
Vol 8 (4) ◽  
pp. 8859-8864

Property ibased iEncryption i(ABE) iis iviewed ias ia ipromising icryptographic ileading iinstrument ito iensure iinformation iproprietors' iimmediate iauthority iover itheir iinformation iin iopen idistributed istorage. iThe iprior iABE iplans iinclude ijust ia isingle iposition ito ikeep iup ithe ientire itrait iset, iwhich ican ibring ia isolitary ipoint ibottleneck ion iboth isecurity iand iexecution. iAccordingly, isome imulti-authority iplans iare iproposed, iin iwhich idifferent ispecialists iindependently ikeep iup idisjoint itrait isubsets. iBe ithat ias iit imay, ithe isingle-point ibottleneck iissue istays iunsolved. iIn ithis ipaper, ifrom ianother iviewpoint, iwe idirect ian iedge imulti-authority iCP-ABE iaccess icontrol iconspire ifor iopen idistributed istorage, inamed iSMAAC, iin iwhich ivarious ispecialists itogether ideal iwith ia iuniform iquality iset. iIn iSMAAC, iexploiting i(t; in) iedge imystery isharing, ithe iace ikey ican ibe ishared iamong ivarious ispecialists, iand ia ilegitimate iclient ican icreate ihis/her imystery ikey iby iassociating iwith iany it ispecialists. iSecurity iand iexecution iinvestigation iresults ishow ithat iSMAAC iisn't ijust iobvious isecure iwhen inot ias imuch ias it ispecialists iare iundermined, iyet iin iaddition istrong iwhen ino inot ias imuch ias it ispecialists iare ialive iin ithe iframework. iBesides, iby iproductively iconsolidating ithe icustomary imulti-authority iconspire iwith iSMAAC, iwe ibuild ia ihalf iand ihalf ione, iwhich ifulfills ithe isituation iof iproperties ioriginating ifrom ivarious ispecialists ijust ias iaccomplishing isecurity iand iframework ilevel istrength


Author(s):  
Jiayong Yu ◽  
Longchen Ma ◽  
Maoyi Tian, ◽  
Xiushan Lu

The unmanned aerial vehicle (UAV)-mounted mobile LiDAR system (ULS) is widely used for geomatics owing to its efficient data acquisition and convenient operation. However, due to limited carrying capacity of a UAV, sensors integrated in the ULS should be small and lightweight, which results in decrease in the density of the collected scanning points. This affects registration between image data and point cloud data. To address this issue, the authors propose a method for registering and fusing ULS sequence images and laser point clouds, wherein they convert the problem of registering point cloud data and image data into a problem of matching feature points between the two images. First, a point cloud is selected to produce an intensity image. Subsequently, the corresponding feature points of the intensity image and the optical image are matched, and exterior orientation parameters are solved using a collinear equation based on image position and orientation. Finally, the sequence images are fused with the laser point cloud, based on the Global Navigation Satellite System (GNSS) time index of the optical image, to generate a true color point cloud. The experimental results show the higher registration accuracy and fusion speed of the proposed method, thereby demonstrating its accuracy and effectiveness.


Author(s):  
P. Sudheer ◽  
T. Lakshmi Surekha

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The  Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.


Author(s):  
Umesh Banodha ◽  
Praveen Kumar Kataria

Cloud is an emerging technology that stores the necessary data and electronic form of data is produced in gigantic quantity. It is vital to maintain the efficacy of this data the need of data recovery services is highly essential. Cloud computing is anticipated as the vital foundation for the creation of IT enterprise and it is an impeccable solution to move databases and application software to big data centers where managing data and services is not completely reliable. Our focus will be on the cloud data storage security which is a vital feature when it comes to giving quality service. It should also be noted that cloud environment comprises of extremely dynamic and heterogeneous environment and because of high scale physical data and resources, the failure of data centre nodes is completely normal.Therefore, cloud environment needs effective adaptive management of data replication to handle the indispensable characteristic of the cloud environment. Disaster recovery using cloud resources is an attractive approach and data replication strategy which attentively helps to choose the data files for replication and the strategy proposed tells dynamically about the number of replicas and effective data nodes for replication. Thus, the objective of future algorithm is useful to help users together the information from a remote location where network connectivity is absent and secondly to recover files in case it gets deleted or wrecked because of any reason. Even, time oriented problems are getting resolved so in less time recovery process is executed.


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


Sign in / Sign up

Export Citation Format

Share Document