Secure Cloud Computing
15 Followers
Recent papers in Secure Cloud Computing
Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity... more
A number of studies on privacy-preserving data mining have been proposed. Most of them assume that they can separate quasi-identifiers (QIDs) from sensitive attributes. For instance, they assume that address, job, and age are QIDs but are... more
11 th International Conference on Cryptography and Information Security (CRYPIS 2022) focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists, researchers and students to... more
International Journal of Wireless Network Security (IJWNS) http://flyccs.com/jounals/IJWNS/Home.html Scope International Journal of Wireless Network Security (IJWNS) is a open access journal that publishes articles which contribute... more
11 th International Conference on Cryptography and Information Security (CRYPIS 2022) focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists, researchers and students to... more
10th International Conference on Cryptography and Information Security (CRYPIS 2021) focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists, researchers and students to... more
To buy this project in ONLINE, Contact: Email: jpinfotechprojects@gmail.com, Website: https://www.jpinfotech.org A Hybrid E-learning Recommendation Approach Based on Learners' Influence Propagation In e-learning recommender systems,... more
Security has been considered as the key concern of adopting cloud computing. This could be ascribed to the customers’ lack of control over their confidential data once in the cloud and to the absence of trust in cloud providers.... more
The multihop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks... more
With the expanding interest for constant applications in the Wireless Senor Network (WSN), ongoing discriminating occasions suspect a proficient quality-of-service (QoS) based Routing for information conveyance from the Network... more
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a large number of customers. Unfortunately, virtualization... more
Security has been considered as the key concern of adopting cloud computing. This could be ascribed to the customers' lack of control over their confidential data once in the cloud and to the absence of trust in cloud providers.... more
Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe security threats that organizations face in the digital era. The threat now extends to our personal lives: a plethora of personal information... more
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most... more
Online social networks gradually integrate financial capabilities by enabling the usage of real and virtual currency. They serve as new platforms to host a variety of business activities such as online promotion events, where users can... more
International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security.
Model combination in classification, density estimation and clustering and forecasting has become a promising research area where better results are obtained compared to using single models. Bayesian inference offers two approaches for... more
International Journal of Wireless Network Security (IJWNS) http://flyccs.com/jounals/IJWNS/Home.html Scope International Journal of Wireless Network Security (IJWNS) is a open access journal that publishes articles which contribute... more
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a large number of customers. Unfortunately, virtualization... more
An algorithm for anonymous sharing of private data among parties is developed. This technique is used iteratively to assign these nodes ID numbers ranging from 1 to N. This assignment is anonymous in that the identities received are... more
Cloud security is one of most important issues that have attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy... more
Photo sharing is an attractive feature which popularizes Online Social Networks (OSNs). Unfortunately, it may leak users' privacy if they are allowed to post, comment, and tag a photo freely.we attempt to address this issue and study the... more
Broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of members but require a trusted party to distribute decryption keys. Group key agreement (GKA) protocols enable a group of members to negotiate a common... more
Understanding the spreading dynamics of computer viruses (worms, attacks) is an important research problem, and has received much attention from the communities of both computer security and statistical physics. However, previous studies... more
Model combination in classification, density estimation and clustering and forecasting has become a promising research area where better results are obtained compared to using single models. Bayesian inference offers two approaches for... more
Social network is a group of individuals with diverse social interactions amongst them. The network large scale and distributed due to Quantitative analysis of networks is need of and in turn the society. Clustering helps us to group... more