Cloud Computing

Cloud computing is an information technology (IT) paradigm that enables ubiquitous access to shared pools of configurable system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet.

RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage

RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage Introduction: Data access control is a challenging issue in public cloud storage systems. Cipher text-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but-curious cloud servers. …

RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage Read More »

Secure Data Sharing in Cloud Computing Using Revocable Storage Identity Based Encryption

Secure Data Sharing in Cloud Computing Using Revocable Storage Identity Based Encryption Introduction: Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the cloud server. Since the data …

Secure Data Sharing in Cloud Computing Using Revocable Storage Identity Based Encryption Read More »

Securing Cloud Data under Key Exposure

Securing Cloud Data under Key Exposure Introduction: Recent news reveal a powerful attacker which breaks data confidentiality by acquiring cryptographic keys, by means of coercion or backdoors in cryptographic software. Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the attacker’s access to the cipher text. This …

Securing Cloud Data under Key Exposure Read More »

TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud

TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud Introduction: The new paradigm of outsourcing data to the cloud is a double-edged sword. On the one hand, it frees data owners from the technical management, and is easier for data owners to share their data with intended users. On the other …

TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud Read More »

TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud

TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud Introduction: Cloud storage provides a convenient, massive, and scalable storage at low cost, but data privacy is a major concern that prevents users from storing files on the cloud trustingly. One way of enhancing privacy from data owner point of view is to encrypt the …

TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud Read More »

Two Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving

Two Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving Introduction: Industries and individuals outsource database to realize convenient and low-cost applications and services. In order to provide sufficient functionality for SQL queries, many secure database schemes have been proposed. However, such schemes are vulnerable to privacy leakage to cloud server. The main reason …

Two Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving Read More »

Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud

Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud Introduction: Online data sharing for increased productivity and efficiency is one of the primary requirements today for any organization. The advent of cloud computing has pushed the limits of sharing across geographical boundaries, and has enabled a multitude of users …

Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud Read More »

Achieving Efficient and Secure Data Acquisition for Cloud supported Internet of Things in Smart Grid

Achieving Efficient and Secure Data Acquisition for Cloud supported Internet of Things in Smart Grid Introduction: Cloud-supported Internet of Things (Cloud-IoT) has been broadly deployed in smart grid systems. The IoT front-ends are responsible for data acquisition and status supervision, while the substantial amount of data is stored and managed in the cloud server. Achieving …

Achieving Efficient and Secure Data Acquisition for Cloud supported Internet of Things in Smart Grid Read More »

Achieving secure universal and fine-grained query results verification for secure search scheme over encrypted cloud data

Achieving secure universal and fine-grained query results verification for secure search scheme over encrypted cloud data Introduction: Secure search techniques over encrypted cloud data allow an authorized user to query data files of interest by submitting encrypted query keywords to the cloud server in a privacy-preserving manner. However, in practice, the returned query results may …

Achieving secure universal and fine-grained query results verification for secure search scheme over encrypted cloud data Read More »

Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems

Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems Introduction: Likely system invariants model properties that hold in operating conditions of a computing system. Invariants may be mined offline from training datasets, or inferred during execution. Scientific work has shown that invariants’ mining techniques support several activities, including capacity planning and detection of failures, anomalies …

Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems Read More »

Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing

Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Introduction: Along with the development of cloud computing, an increasing number of enterprises start to adopt cloud service, which promotes the emergence of many cloud service providers. For cloud service providers, how to configure their cloud service platforms to obtain the maximum profit becomes increasingly …

Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Read More »

Identity Based Data Outsourcing with Comprehensive Auditing in Clouds

Identity Based Data Outsourcing with Comprehensive Auditing in Clouds Introduction: Cloud storage system provides facilitative file storage and sharing services for distributed clients. To address integrity, controllable outsourcing and origin auditing concerns on outsourced files, we propose an identity-based data outsourcing (IBDO) scheme equipped with desirable features advantageous over existing proposals in securing outsourced data. …

Identity Based Data Outsourcing with Comprehensive Auditing in Clouds Read More »

Identity Based Private Matching over Outsourced Encrypted Datasets

Identity Based Private Matching over Outsourced Encrypted Datasets Introduction: With wide use of cloud computing and storage services, sensitive information is increasingly centralized into the cloud to reduce the management costs, which raises concerns about data privacy. Encryption is a promising way to maintain the confidentiality of outsourced sensitive data, but it makes effective data …

Identity Based Private Matching over Outsourced Encrypted Datasets Read More »

Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage

Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage Introduction: Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to prove to a verifier that it is actually storing a data owner’s data honestly. To date, a number of RDIC protocols have been proposed in the …

Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage Read More »

On the Security of Data Access Control for Multi authority Cloud Storage Systems

On the Security of Data Access Control for Multi-authority Cloud Storage Systems Introduction: Data access control has becoming a challenging issue in cloud storage systems. Some techniques have been proposed to achieve the secure data access control in a semi trusted cloud storage system. Recently, K.Yang et al.proposed a basic data access control scheme for …

On the Security of Data Access Control for Multi authority Cloud Storage Systems Read More »

Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing

Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing Introduction: With the popularity of wearable devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care. The processing chain of medical data mainly includes data collection, data storage and data sharing, etc. Traditional healthcare system …

Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing Read More »

Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data

Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data Introduction: The amount of data generated by individuals and enterprises is rapidly increasing. With the emerging cloud computing paradigm, the data and corresponding complex management tasks can be outsourced to the cloud for the management flexibility and cost savings. Unfortunately, as the data could be sensitive, the …

Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data Read More »

Privacy Protection based Access Control Scheme in Cloud-based Services

Privacy Protection based Access Control Scheme in Cloud-based Services Introduction: With the rapid development of the computer technology, cloud-based services have become a hot topic. Cloud based services not only provide users with convenience, but also bring many security issues. Therefore, the study of access control scheme to protect users’ privacy in cloud environment is …

Privacy Protection based Access Control Scheme in Cloud-based Services Read More »

Identity-Based Encryption with Cloud Revocation Authority and Its Applications

Identity-Based Encryption with Cloud Revocation Authority and Its Applications Introduction: Identity-based encryption (IBE) is a public key crypto system and eliminates the demands of public key infrastructure (PKI) and certificate administration in conventional public key settings. Due to the absence of PKI, the revocation problem is a critical issue in IBE settings. Several revocable IBE …

Identity-Based Encryption with Cloud Revocation Authority and Its Applications Read More »

Fast Phrase Search for Encrypted Cloud Storage

Fast Phrase Search for Encrypted Cloud Storage Introduction: Cloud computing has generated much interest in the research community in recent years for its many advantages, but has also raise security and privacy concerns. The storage and access of confidential documents have been identified as one of the central problems in the area. In particular, many …

Fast Phrase Search for Encrypted Cloud Storage Read More »

Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

Efficient and Expressive Keyword Search Over Encrypted Data in Cloud Introduction: Searchable encryption allows a cloud server to conduct keyword search over encrypted data on behalf of the data users without learning the underlying plain texts. However, most existing searchable encryption schemes only support single or conjunctive keyword search, while a few other schemes that …

Efficient and Expressive Keyword Search Over Encrypted Data in Cloud Read More »

A robust reputation management mechanism in the federated cloud.

A robust reputation management mechanism in the federated cloud. Introduction: In the Infrastructure as a Service (IaaS) paradigm of cloud computing, computational resources are available for rent. Although it offers a cost efficient solution to virtual network requirements, low trust on the rented computational resources prevents users from using it. To reduce the cost, computational …

A robust reputation management mechanism in the federated cloud. Read More »

A Modified Hierarchical Attribute Based Encryption Access Control Method for Mobile Cloud Computing

A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing Introduction: Cloud computing is an Internet-based computing pattern through which shared resources are provided to devices on demand. Its an emerging but promising paradigm to integrating mobile devices into cloud computing, and the integration performs in the cloud based hierarchical multi-user data-shared environment. …

A Modified Hierarchical Attribute Based Encryption Access Control Method for Mobile Cloud Computing Read More »

Profit Optimizations Cloud: A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users

A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users Introduction: In this paper, we try to design a service mechanism for profit optimizations of both a cloud provider and its multiple users. We consider the problem from a game theoretic perspective and characterize the relationship between the cloud provider and …

Profit Optimizations Cloud: A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users Read More »

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage Introduction: As an important application in cloud computing, cloud storage offers user scalable, flexible and high quality data storage and computation services. A growing number of data owners choose to outsource data files to the cloud. Because cloud storage servers are not fully trustworthy, …

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage Read More »

A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing Introduction : With the popularity of cloud computing, mobile devices can store/retrieve personal data from anywhere at any time. Consequently, the data security problem in mobile cloud becomes more and more severe and prevents further development of mobile cloud. There are substantial studies that have …

A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing Read More »

Secure Deduplication of Encrypted Data in Cloud

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Introduction : Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud. Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing specific credentials …

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Read More »

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification

Cross tenant access control model for cloud computing. Sharing of resources on the cloud can be achieved on a large scale since it is cost effective and location independent. Despite the hype surrounding cloud computing, organizations are still reluctant to deploy their businesses in the cloud computing environment due to concerns in secure resource sharing. In …

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification Read More »