A cryptographic key generation scheme for multilevel data security
In 1982, and Taylor proposed an elegant solution to rhe partially ordered multilevel key distribution problem, using a cryptographic approach. Since then, continuing research has been conducred to try to realize and simplify their scheme. Generally speaking, there are
Towards achieving data security with the cloud computing adoption framework.
Offering real-time data security for petabytes of data is important for Cloud Computing. A recent survey on cloud security states that the security of users data has the highest priority as well as concern. We believe this can only be able to achieve with an approach that is
Data security model for cloud computing
With the development of cloud computing, Data security becomes more and more important in cloud computing. This paper analyses the basic problem of cloud computing data security . With the analysis of HDFS architecture, we get the data security requirement of cloud
Data security in cloud computing with elliptic curve cryptography
Cloud computing is one of todays hottest research areas due to its ability to reduce costs associated with computing while increasing scalability and flexibility for computing services. Cloud computing is Internet based computing due to shared resources, software and the protection of data from accidental or malicious modification, destruction, or disclosure (FIPS); the science and study of methods of protecting data in computer and communications systems against unauthorized disclosure, transfer, delay, modifications, or
Privacy and Data Security Risks in Cloud Computing.
In recent years, cloud computing has emerged as one of the fastest-growing segments of the information technology industry. The ability to leverage economies of scale, geographic distribution,
Robust data security for cloud while using third party auditor
Cloud computing has been envisioned as the next-generation technology of IT industries. The Cloud is a platform where data owner remotely store their data in the cloud to enjoy the high quality applications and services. The client or data owner send their data to data
Enhancing data security using video steganography
Information security has become the area of concern as a result of widespread use of communication medium over the internet. This paper focuses on the data security approach when combined with encryption and steganographic techniques for secret communication
FREE IEEE PAPER