Articles with "cloud storage" as a keyword



Photo by arthurbizkit from unsplash

Cross‐Analysis of Researchers' Different Shared File Management Activities in Cloud Storage

Sign Up to like & get
recommendations!
Published in 2022 at "Proceedings of the Association for Information Science and Technology"

DOI: 10.1002/pra2.722

Abstract: Using cloud storage for collaborative projects has become common practice among researchers. However, despite its popularity, we lack an understanding of researchers' shared file management practices in cloud storage. More importantly, although researchers engage in… read more here.

Keywords: file management; shared file; management activities; cloud storage ... See more keywords
Photo by lukaszlada from unsplash

Enabling public auditability for operation behaviors in cloud storage

Sign Up to like & get
recommendations!
Published in 2017 at "Soft Computing"

DOI: 10.1007/s00500-016-2311-y

Abstract: In this paper, we focus on auditing for users’ operation behaviors, which is significant for the avoidance of potential crimes in the cloud and equitable accountability determination in the forensic. We first present a public… read more here.

Keywords: block; operation behaviors; cloud storage; operation ... See more keywords
Photo by lukaszlada from unsplash

Minimal key set of binary key-derivation tree in cloud storage

Sign Up to like & get
recommendations!
Published in 2021 at "Soft Computing"

DOI: 10.1007/s00500-021-06065-w

Abstract: Managing multiple symmetric keys is a critical issue when symmetric cryptography is adopted to protect the confidentiality of the outsourced data in cloud storage. Hierarchical key management utilizing key derivation is a widely studied mechanism.… read more here.

Keywords: key derivation; minimal key; cloud storage; key set ... See more keywords
Photo by lukaszlada from unsplash

Enhancing security and privacy of images on cloud by histogram shifting and secret sharing

Sign Up to like & get
recommendations!
Published in 2017 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-017-5306-5

Abstract: In contemporary society, people can easily use any smart device at hand to capture images of scenery and upload them to cloud storage. Cloud storage is widely used for storing user generated multimedia content. However,… read more here.

Keywords: histogram; cloud storage; secret sharing; images cloud ... See more keywords
Photo by lukaszlada from unsplash

Public auditing of log integrity for shared cloud storage systems via blockchain

Sign Up to like & get
recommendations!
Published in 2020 at "Wireless Networks"

DOI: 10.1007/s11276-020-02373-5

Abstract: Cloud storage security has received widespread attention from industry and academia. When cloud data is damaged and tampered by various types of security attacks, it is one of the most common methods to track accidents… read more here.

Keywords: public auditing; cloud storage; shared cloud; integrity ... See more keywords
Photo from wikipedia

NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems

Sign Up to like & get
recommendations!
Published in 2017 at "Journal of Central South University"

DOI: 10.1007/s11771-017-3483-z

Abstract: The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untrusted… read more here.

Keywords: multi authority; cloud storage; encryption; based abe ... See more keywords
Photo by lukaszlada from unsplash

ID-Based Public Auditing Protocol for Cloud Storage Data Integrity Checking with Strengthened Authentication and Security

Sign Up to like & get
recommendations!
Published in 2018 at "Wuhan University Journal of Natural Sciences"

DOI: 10.1007/s11859-018-1335-9

Abstract: Cloud storage service reduces the burden of data users by storing users’ data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity… read more here.

Keywords: public auditing; cloud storage; security; protocol ... See more keywords
Photo by lukaszlada from unsplash

Multi-bit data de-duplication-based cloud storage channel covert

Sign Up to like & get
recommendations!
Published in 2019 at "Measurement"

DOI: 10.1016/j.measurement.2018.11.064

Abstract: Abstract The purpose of this paper is to improve the efficiency and security of the cloud storage user data, a method of multi-bit data de-duplication-based cloud storage channel covert is proposed. Firstly, a covert channel… read more here.

Keywords: storage; multi bit; cloud storage; bit data ... See more keywords
Photo by priscilladupreez from unsplash

Non-homogeneous distributed cloud storage system with minimal redundancy in heterogeneous environment

Sign Up to like & get
recommendations!
Published in 2019 at "Measurement"

DOI: 10.1016/j.measurement.2018.11.073

Abstract: Abstract To improve the reasonability of constructing distributed cloud storage system, a method of constructing distributed cloud storage system with minimum redundancy considering heterogeneity in heterogeneous environment is proposed. First, In the analysis of algorithm… read more here.

Keywords: redundancy; storage; storage system; cloud storage ... See more keywords
Photo by lukaszlada from unsplash

Practical estimation of cloud storage costs for clinical genomic data

Sign Up to like & get
recommendations!
Published in 2020 at "Practical Laboratory Medicine"

DOI: 10.1016/j.plabm.2020.e00168

Abstract: Background Laboratories performing clinical high-throughput sequencing for oncology and germline testing are increasingly migrating their data storage to cloud-based solutions. Cloud-based storage has several advantages, such as low per-GB prices, scalability, and minimal fixed costs;… read more here.

Keywords: storage; estimation; cloud storage; test ... See more keywords
Photo by priscilladupreez from unsplash

Cloud storage forensics: MEGA as a case study

Sign Up to like & get
recommendations!
Published in 2017 at "Australian Journal of Forensic Sciences"

DOI: 10.1080/00450618.2016.1153714

Abstract: The increasing use of smartphones and cloud storage apps allows users to access their data anywhere, anytime. Due to the potential of mobile devices being used and/or targeted by criminals, such devices are an important… read more here.

Keywords: storage forensics; storage; forensics mega; mega case ... See more keywords