The advances made by technology ensure increasing popularity of cloud computing, with major industry players having their foundation deeply rooted in the cloud computing technology. The technology depends on resource ...
详细信息
ISBN:
(纸本)9781467329255
The advances made by technology ensure increasing popularity of cloud computing, with major industry players having their foundation deeply rooted in the cloud computing technology. The technology depends on resource sharing, thus facilitating coherence and economies of scale. The incessant advances in the technology pose security challenges that are equally striking. It has already been pointed out that cryptography alone cannot meet the privacy demanded by common cloud computing services. The paper presents an implementation of an identity based distributedcloudstorage encryption scheme for data storage on cloud which facilitates privacy preservation when the confidential data is stored with a third party and hence escapes the protection sphere of data owner. The proposed scheme is more suitable for the privacy preserving of mass users.
The advances made by technology ensure increasing popularity of cloud computing, with major industry players having their foundation deeply rooted in the cloud computing technology. The technology depends on resource ...
详细信息
ISBN:
(纸本)9781467322423;9789786627113
The advances made by technology ensure increasing popularity of cloud computing, with major industry players having their foundation deeply rooted in the cloud computing technology. The technology depends on resource sharing, thus facilitating coherence and economies of scale. The incessant advances in the technology pose security challenges that are equally striking. It has already been pointed out that cryptography alone cannot meet the privacy demanded by common cloud computing services. The paper presents an implementation of an identity based distributedcloudstorage encryption scheme for data storage on cloud which facilitates privacy preservation when the confidential data is stored with a third party and hence escapes the protection sphere of data owner. The proposed scheme is more suitable for the privacy preserving of mass users and hence can be easily extended to distributed File System Such as Hadoop.
The advances made by technology ensure increasing popularity of cloud computing, with major industry players having their foundation deeply rooted in the cloud computing technology. The technology depends on resource ...
详细信息
ISBN:
(纸本)9781467322423
The advances made by technology ensure increasing popularity of cloud computing, with major industry players having their foundation deeply rooted in the cloud computing technology. The technology depends on resource sharing, thus facilitating coherence and economies of scale. The incessant advances in the technology pose security challenges that are equally striking. It has already been pointed out that cryptography alone cannot meet the privacy demanded by common cloud computing services. The paper presents an implementation of an identity based distributedcloudstorage encryption scheme for data storage on cloud which facilitates privacy preservation when the confidential data is stored with a third party and hence escapes the protection sphere of data owner. The proposed scheme is more suitable for the privacy preserving of mass users and hence can be easily extended to distributed File System Such as Hadoop.
暂无评论