Corpus ID: 145893811

securing cloud data under key exposure

@inproceedings{Somasekhar2018securingCD,
  title={securing cloud data under key exposure},
  author={M. Somasekhar and A. Baki},
  year={2018}
}
  • M. Somasekhar, A. Baki
  • Published 2018
  • Computer Science
  • Social networks area unit a form of social group structure that consists of multiple nodes and therefore the relationships among them. Through these relationships, social networks connect all types of participants, from casual speaking acquaintances to closely related family members. However whereas online social networks bring convenience to fashionable life, they'll have negative effects yet. In politics, as an example, rumors might be made and unfold on social networks that cause incidents… CONTINUE READING
    10 Citations

    Topics from this paper

    Poster Abstract: Secure Data Sharing by Means of Fragmentation, Encryption, and Dispersion
    • 2
    Security and Trust Management
    • Highly Influenced
    Secured outsourcing towards a cloud computing environment based on DNA cryptography
    • 4
    Enhancing Data Protection in a Distributed Storage Environment Using Structure-Wise Fragmentation and Dispersal of Encrypted Data
    • Katarzyna Kapusta, G. Memmi
    • Computer Science
    • 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
    • 2018
    • 9
    Reinforcing Protection Against Chosen-Plaintext Attack Using Ciphertext Fragmentation in Multi-cloud Environments
    • Katarzyna Kapusta, Han Qiu, G. Memmi
    • Computer Science
    • 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
    • 2019
    • Highly Influenced
    Circular AON: A Very Fast Scheme to Protect Encrypted Data Against Key Exposure
    • 4
    • Highly Influenced
    PE-AONT: Partial Encryption combined with an All-or-Nothing Transform
    • Highly Influenced
    • PDF
    Circular All-Or-Nothing: Revisiting Data Protection Against Key Exposure
    • Highly Influenced

    References

    SHOWING 1-10 OF 12 REFERENCES
    Studying Online Social Networks
    • 1,107
    • PDF
    Crawling Online Social Graphs
    • 126
    • PDF
    Friends and neighbors on the Web
    • 2,124
    • PDF
    Walking in Facebook: A Case Study of Unbiased Sampling of OSNs
    • 648
    • PDF
    SimRank: a measure of structural-context similarity
    • 1,794
    • PDF
    Statistical mechanics of complex networks
    • 16,640
    • PDF
    Data Mining - Concepts and Techniques
    • P. Perner
    • Computer Science
    • Künstliche Intell.
    • 2002
    • 9,510