A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Prasanthi, B. G.
- Security Issues & Comparison of Existing Algorithms in Cloud to Support Multicloud
Authors
1 Adarsh Institute of Management and Information Technology, IN
2 SB College, Changanassery, IN
Source
Adarsh Journal of Information Technology, Vol 6, No 1 (2017), Pagination: 33-36Abstract
Cloud computing is fundamentally altering the expectations for how and when computing, storage and networking resources should be allocated, managed, consume and allow users to utilize services globally. Due to the powerful computing and storage, high availability and security, easy accessibility and adaptability, reliable scalability and interoperability, cost and time effective cloud computing is the top needed for current fast growing business world.Multi cloud is an emerging concept where security is a major issue.Keywords
Cloud Computing, PaaS, IaaS, SaaS, NaaS, BaaS, Network Service Providers For Cloud, Encryption and Decryption, Cloud Security.References
- IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No. 2, January 2012 ISSN (Online): 1694-0814
- Secure Cloud Computing through Homomorphic Encryption Maha TEBAA, Said EL HAJII
- Kuyoro S. O., Ibikunle F. & Awodele O. International Journal of Computer Networks (IJCN), Volume (3) : Issue (5) : 2011 247 Cloud Computing Security Issues and Challenges
- IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 19-21 Privacy Protection in Cloud computing by using Cryptographic Technique.
- Volume 4, Issue 4, April 2014 ISSN: 2277 128X International Journal of Advanced Comparison among Various Cryptographic Algorithms
- International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 1, Issue 2, Feb 2014. ISSN 2348 – 4853 A Survey on Data Integrity of Cloud Storage in Cloud Computing
- International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 11, November 2013 A Survey on Attribute Based Encryption Scheme in Cloud Computing
- International Journal of Computer Applications (0975 – 8887) Volume 82 – No1, November 2013 An Investigation on the Issues in Cloud Data Security
- Homomorphic Encryption: Theory & Application Jaydip Sen Department of Computer Science, National Institute of Science & Technology Odisha,
- Homomorphic Encryption and the BGN Cryptosystem, David Mandell Freeman 11. Comparative study of various Security Algorithms applicable in Multi-Cloud Environment - Ms.Theres Bemila Karan Kundar Lokesh Jain Shashikant Sharma Nayan Makasare
- Privacy and Security in Storage of Matching Protocol for MSN
Authors
1 AIMIT, Bangalore, IN
Source
Adarsh Journal of Information Technology, Vol 5, No 2 (2016), Pagination: 49-52Abstract
Discovery based on common attributes or similarity of users profile is a key component of mobile social networking. Preserving the privacy of profiles of matching users whiles matching is the major challenge of this system. These profiles contain very sensitive information managed by, setup procedures and revocation procedures. And to design distributed privacy preservation match protocol aimed at privacy preservation and security of users with a reduced communication cost.
Comparing their individual profile and is frequently the first step towards effectual As a security of User, directly publish their full profiles for remaining of them to search, the users' personal profile contain sensitive information which can't be open thing which is tried to solve MSN which are based on proximity. Attractive proximity-based communication platform for mobile users with similar interests, attributes, or background to communicate with each other. In this kind of proximity-based MSN, matching protocol is solving.
Data vector pre calculated by a central server which is trusted to stand for the location of a client in an online social network on social attribute data due to its key-sharing problem and information leakage problem.
Keywords
MSN, Proximity, Social Networking.References
- M. Li, N. Cao, S. Yu, and W. Lou, “Findu: Privacy-preserving personal profile matching in mobile social networks,” in IEEE INFOCOM ’11, Apr 2011, pp. 1–9.
- Z. Yang, B. Zhang, J. Dai, A. Champion, D. Xuan, and D. Li, “Esmalltalker: A distributed mobile system for social networking in physical proximity,” in IEEE ICDCS ’10, June. 2010. 11
- R. Lu, X. Lin, X. Liang, and X. Shen, “A secure handshake scheme with symptomsmatching for mhealthcare social network,” Mobile networks and Applications, pp. 1–12, 2010.
- C. Zhang, X. Zhu, Y. Song, and Y. Fang, “C4: A new paradigm for providing incentives in multi-hop wireless networks,” in INFOCOM, 2011 Proceedings IEEE, april 2011, pp. 918 –926.
- M. Freedman, K. Nissim, and B. Pinkas, “Efficient private matching and set intersection,” in EUROCRYPT’04. Springer- Verlag, 2004, pp. 1–19.
- Q. Ye, H. Wang, and J. Pieprzyk, “Distributed private matching and set operations,” in ISPEC’08, 2008, pp. 347–360.
- E. D. Cristofaro and G. Tsudik, “Practical private set intersection protocols with linear complexity,” in Financial Cryptography and Data Security ’10, 2010.s