Corpus ID: 14335275

Providing Data Protection as a Service in Cloud Computing

@inproceedings{Cherian2013ProvidingDP,
  title={Providing Data Protection as a Service in Cloud Computing},
  author={Sunumol Cherian and Kavitha Murukezhan},
  year={2013}
}
Data protection in cloud has become an unavoidable and tremendously increasing technology. [...] Key Method User authentication is provided using alphanumeric password and graphical password, security is provided using encryption of the file using key. Key management is an important concept used for the protection of data. Overall transactions are viewed by an auditor. Here multilevel data protection is guaranteed for the cloud users.Expand
9 Citations
Detailed Review of Different Security Techniques for Data Protection in Cloud Computing
  • Suraj Shukla
  • Computer Science
  • 2020
TLDR
Data protection is one among the foremost important security issues, because organizations won’t relocate its data to remote machines if there isn't any guaranteed data protection from the cloud service providers. Expand
Security of Data in Cloud Environment Using DPaaS
TLDR
The various security challenges have been highlighted and the various necessary metrics required for designing DPaaS have been investigated and a solution to make existing developed applications for simple cloud Systems compatible with DPAAS is proposed. Expand
Data Protection On Cloud With MultiSet Partitions
This paper offers strong data protection to cloud users while enabling rich applications is a challenging task. We are exploring a new cloud platform architecture called Data Protection as a ServiceExpand
SURVEY ON DATA SECURITY BY USING SECURE REPLICATION IN CLOUD
TLDR
This paper presents the secure approach that encrypt and replicate the data in distributed data server storage system, which involves the replication and storage of data. Expand
TECHNIQUES TO SLICE THE PASSWORD FOR PRESERVING THE PRIVACY IN CLOUD COMPUTING
TLDR
Graphical passwords have been designed to try to make passwords more memorable and easier for people to use and, therefore, more secure. Expand
Cloud Computing and Data Protection Challenges
Cloud computing is basically a new technique for outsourcing computer services. Instead of storing your data or your software on your network, you pay a company to store them for you. Instead ofExpand
Survey Paper on Critical Section & Privacy Issue In Cloud Computing
TLDR
A comparative research analysis of the existing research work with reference to the data security and privacy protection techniques used in the cloud computing environment is made. Expand
Research Article Impact Factor: 4.226 ISSN: 2319-507X Faizan I. Khandwani, IJPRET, 2015; Volume 3 (9): 449-455 IJPRET
\ Abstract: Cloud computing is a computing prototype, where a large pool of systems are connected in public or private networks, to provide dynamically scalable infrastructure for application, dataExpand

References

SHOWING 1-10 OF 66 REFERENCES
Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection
TLDR
This paper examines the problem of protecting data for all users, and not just for some, and uses broad applicability as the driving goal, and explores the challenges and promises of reaching towards that goal with efficiency and high assurance. Expand
Fully homomorphic encryption using ideal lattices
TLDR
This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable. Expand
Robust discretization, with an application to graphical passwords
TLDR
This work presents a discretization method which is tolerant to uncertainties (described by an error distance r, which can be adjusted to the applications), which enables to implement very flexible graphical password schemes, and digital watermarking. Expand
Quantitative information flow as network flow capacity
TLDR
A new technique for determining how much information about a program's secret inputs is revealed by its public outputs is presented, which achieves a more precise quantitative result by computing a maximum flow of information between the inputs and outputs. Expand
The Differential Privacy Frontier (Extended Abstract)
  • C. Dwork
  • Mathematics, Computer Science
  • TCC
  • 2009
TLDR
The definition of differential privacy is reviewed and a handful of very recent contributions to the differential privacy frontier are surveyed. Expand
Earrthworm diversity and habitat preferences in arid regions of Rajasthan
TLDR
The occurrence of most of the species in sewage soil as compared to other pedoecosystems may be related to high organic carbon and much higher nitrogen of the sewage system. Expand
Earthworms (Oligochaeta) from islands of the south-western Pacific, and a note on two species from Papua New Guinea
TLDR
Earthworms collected from the southwestern Pacific islands of Samoa, Tonga, Fiji, Niue, and the Kermadecs on the 1980 expedition of the Soviet Research Ship Kallisto, and by other expeditions and surveys, are discussed and a key to the earthworms recorded from the south-western Pacific is provided. Expand
Population dynamics of earthworms (Oligochaeta) in cultivated soils of central Himalayan tarai region
TLDR
Earthworm population dynamics was studied in a cultivated soil at Shantipuri and showed positive correlations between soil moisture and worm biomass and age structure of earthworms indicated that clitellates were more abundant than aclitellate during the wet periods (June-October). Expand
Earthworms from northern Indian states with Ocnerodrilus occidentalis Eisen, 1878 as a new report from Punjab
TLDR
This note lists thirty species of earthworms including twenty from Punjab and the Union Territory of Chandigarh and reports Ocnerodrilus occidentalis Eisen (1878) as new record from Punjab. Expand
Illustrations of earthworms occurring in and around Chennai, India
TLDR
Earthworm species collected from Chennai and its environs were identified using existing taxonomic keys and a brief guide for identification by budding vermiculturists was prepared. Expand
...
1
2
3
4
5
...