Blog

18

Nov2014
DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS ABSTRACT: We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing ... Read More

18

Nov2014
PROBABILISTIC CONSOLIDATION OF VIRTUAL MACHINES IN SELF-ORGANIZING CLOUD DATA CENTERS   CLICK HERE TO VIEW THE OUTPUT ABSTRACT: Power efficiency is one of the main issues that will drive the design of data centers, especially of those devoted to provide Cloud computing services. ... Read More

18

Nov2014
Secure Data Retrival For Decentralized Disruption Tolerant Military Networks ABSTRACT:  Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices ... Read More

18

Nov2014
PACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM ABSTRACT: In this paper, we present PACK (Predictive ACKs), a novel end-to-end traffic redundancy elimination (TRE) system, designed for cloud computing customers. Cloud-based TRE needs to apply a judicious use of cloud resources so that the bandwidth cost ... Read More

18

Nov2014
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing ABSTRACT: Cloud computing is emerging as a prevalent data interactive paradigm to realize users’ data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without ... Read More

18

Nov2014
CONSISTENCY AS A SERVICE: AUDITING CLOUD CONSISTENCY ABSTRACT: Cloud storage services have become commercially popular due to their overwhelming advantages. To provide ubiquitous always-on access, a cloud service provider (CSP) maintains multiple replicas for each piece of data on geographically distributed servers. A key problem of ... Read More

18

Nov2014
KEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE ABSTRACT: Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts ... Read More

17

Nov2014
IDENTITY-BASED DISTRIBUTED PROVABLE DATA POSSESSION IN MULTI-CLOUD STORAGE ABSTRACT: Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether their outsourced data is kept intact without downloading the whole data. In some application scenarios, the clients have to ... Read More

17

Nov2014
ENABLING DATA INTEGRITY PROTECTION IN REGENERATING-CODING-BASED CLOUD STORAGE: THEORY AND IMPLEMENTATION ABSTRACT: To protect outsourced data in cloud storage against corruptions, adding fault tolerance to cloud storage, along with efficient data integrity checking and recovery procedures, becomes critical. Regenerating codes provide fault tolerance by striping data ... Read More

17

Nov2014
DISTRIBUTED, CONCURRENT, AND INDEPENDENT ACCESS TO ENCRYPTED CLOUD DATABASES ABSTRACT: Power efficiency is one of the main issues that will drive the design of data centers, especially of those devoted to provide Cloud computing services. In virtualized data centers, consolidation of Virtual Machines (VMs) ... Read More