securing cloud data under key exposure
@inproceedings{Somasekhar2018securingCD, title={securing cloud data under key exposure}, author={M. Somasekhar and A. Baki}, year={2018} }
Social networks area unit a form of social group structure that consists of multiple nodes and therefore the relationships among them. Through these relationships, social networks connect all types of participants, from casual speaking acquaintances to closely related family members. However whereas online social networks bring convenience to fashionable life, they'll have negative effects yet. In politics, as an example, rumors might be made and unfold on social networks that cause incidents… CONTINUE READING
Topics from this paper
10 Citations
Poster Abstract: Secure Data Sharing by Means of Fragmentation, Encryption, and Dispersion
- Computer Science
- IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
- 2019
- 2
Secured outsourcing towards a cloud computing environment based on DNA cryptography
- Computer Science
- 2018 International Conference on Information Networking (ICOIN)
- 2018
- 4
Analyzing Cyber-Attack Intention for Digital Forensics Using Case-Based Reasoning
- Computer Science
- ArXiv
- 2021
- PDF
Enhancing Data Protection in a Distributed Storage Environment Using Structure-Wise Fragmentation and Dispersal of Encrypted Data
- Computer Science
- 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
- 2018
- 9
Reinforcing Protection Against Chosen-Plaintext Attack Using Ciphertext Fragmentation in Multi-cloud Environments
- Computer Science
- 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
- 2019
- Highly Influenced
Circular AON: A Very Fast Scheme to Protect Encrypted Data Against Key Exposure
- Computer Science
- CCS
- 2018
- 4
- Highly Influenced
A Fast and Scalable Fragmentation Algorithm for Data Protection Using Multi-storage over Independent Locations
- Computer Science
- STM
- 2018
- 1
PE-AONT: Partial Encryption combined with an All-or-Nothing Transform
- Computer Science
- ArXiv
- 2018
- Highly Influenced
- PDF
Circular All-Or-Nothing: Revisiting Data Protection Against Key Exposure
- Computer Science
- ArXiv
- 2019
- Highly Influenced
References
SHOWING 1-10 OF 12 REFERENCES
Crawling Online Social Graphs
- Computer Science
- 2010 12th International Asia-Pacific Web Conference
- 2010
- 126
- PDF
Walking in Facebook: A Case Study of Unbiased Sampling of OSNs
- Computer Science
- 2010 Proceedings IEEE INFOCOM
- 2010
- 648
- PDF
A Measure of Similarity between Graph Vertices: Applications to Synonym Extraction and Web Searching
- Mathematics, Computer Science
- SIAM Rev.
- 2004
- 419
- PDF