Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud storage service
biblio
Development of an Algorithmic Approach for Hiding Sensitive Data and Recovery of Data based on Fingerprint Identification for Secure Cloud Storage
Submitted by aekwall on Fri, 05/06/2022 - 11:51am
Predictive Metrics
encryption audits
cloud storage service
MD5 (Message Digest)
Integrity Auditing
fingerprint identification
3DES (Triple-data Encryption Standard)
data integrity
Three-dimensional displays
security
Fingerprint recognition
Compositionality
Resiliency
pubcrawl
Distributed databases
encryption
authentication
Cloud Computing
biblio
Design and Development of Collaborative Approach for Integrity Auditing and Data Recovery based on Fingerprint Identification for Secure Cloud Storage
Submitted by aekwall on Fri, 05/06/2022 - 11:50am
Predictive Metrics
encryption audits
MD5 (Message Digest)
Integrity Auditing
fingerprint identification
cloud storage service
3DES (Triple-data Encryption Standard)
data integrity
Three-dimensional displays
security
Fingerprint recognition
Safety
Compositionality
Resiliency
pubcrawl
encryption
authentication
Cloud Computing
biblio
Achieving Privacy-Preserving CP-ABE Access Control with Multi-Cloud
Submitted by grigby1 on Fri, 07/24/2020 - 11:49am
single cloud environment
cloud storage service
CP-ABE algorithm
multi-cloud
multicloud architecture
multicloud CP-ABE
privacy leakage
Privacy-preserving
privacy-preserving CP-ABE access control scheme
share data
cloud storage environment
single cloud scheme
single-cloud CP-ABE
suitable security access control technology
user attribute set
user collusion attack
user data
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
collaboration
pubcrawl
encryption
Access Control
authorisation
Cloud Computing
data privacy
Servers
Scalability
storage management
privacy
Cryptography
policy-based governance
CP-ABE
encryption scheme
access control overhead
access policy tree
achieving privacy-preserving CP-ABE access control
ciphertext-policy
cloud storage
biblio
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively
Submitted by aekwall on Mon, 07/20/2020 - 9:55am
outsourced data
white box cryptography
white-box traceablity
white-box traceable CP-ABE
outsourced data security
original key owner
malicious cloud users
fully secure traceable CP-ABE system
commitment
catch people
access credentials
cloud storage service
Context
Law
fine-grained access control
Cloud Computing
outsourcing
Metrics
composability
pubcrawl
Resiliency
cloud storage
Access Control
encryption
encrypted data
Data Security
Cryptography
authorisation
ciphertext-policy attribute-based encryption
biblio
Efficient Privacy Preserving and Dynamic Public Auditing for Storage Cloud
Submitted by aekwall on Mon, 03/09/2020 - 10:06am
Auditor
Security Audits
TPA
third party auditor
stored data
storage correctness
storage cloud
public auditing scheme
public auditing
privacy preserving auditing
dynamic public auditing
data dynamics operations
data dynamics
cloud storage service
Batch Auditing
Cloud Computing
auditing
storage management
Scalability
Merkle hash tree
cloud server
integrity
privacy
pubcrawl
Human behavior
Resiliency
data integrity
data privacy
storage server
Cryptography
biblio
Real-Time Proof of Violation with Adaptive Huffman Coding Hash Tree for Cloud Storage Service
Submitted by aekwall on Mon, 02/24/2020 - 9:56am
file access patterns
Repudiation
violation scheme
tree structure
tree nodes
tree construction algorithm
service-level agreement
real-time proof
proof of violation
PoV scheme
non-repudiation
Huffman coding
Huffman codes
hash tree
file system
Cloud Computing
cryptographic proofs
cloud storage service
adaptive Huffman coding hash tree
service provider
tree data structures
storage management
data compression
trees (mathematics)
Metrics
composability
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
Submitted by grigby1 on Thu, 09/26/2019 - 9:43am
resilience
Peer-to-peer computing
Proxy Reencryption
pubcrawl
Public key
public key cryptography
quantum computing
quantum computing algorithms
random oracle model
random processes
Metrics
Resiliency
ring-lwe
robust file storage capability
search problem
search problems
secure data sharing
Secure File Sharing
secure file sharing scheme
security issues
decryption time
chosen ciphertext secure
Cloud Computing
cloud storage security
cloud storage service
Collaborative Work
composability
computing technologies
confidentiality
CSS
CCA secure proxy re-encryption scheme
encrypted files
encryption
groupware
Human behavior
Human Factors
lattice based cryptography
Lattices
malicious insiders
biblio
Asymmetric Secure Storage Scheme for Big Data on Multiple Cloud Providers
Submitted by grigby1 on Wed, 03/06/2019 - 3:27pm
cloud storage service
users space
store big data
storage management
single cloud storage
Servers
pubcrawl
multiple cloud storage provider
multiple cloud providers
metadata
meta data
local storage
insider attack
data privacy
data owner
Cryptography
Intelligent Data and Security
cloud service
Cloud Security
Cloud Computing
bit data center
big data privacy
big data file
Big Data
authorisation
asymmetric security concept
asymmetric secure storage scheme
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
CloudSec: A Novel Approach to Verifying Security Conformance at the Bottom of the Cloud
Submitted by grigby1 on Tue, 02/06/2018 - 12:44pm
security
model checking
openstack
pubcrawl
quality of service
real cloud scenarios
Resiliency
Scalability
SecSLA model
Metrics
Security Conformance
security constraints
security of data
security SLA
storage management
UPPAAL
Virtual machining
CloudBeh model
big data analysis
big data security metrics
Cloud Computing
Cloud Modeling
cloud service behaviors
cloud service provider
cloud service security conformance
cloud storage service
Big Data
CloudBeh performance metrics conformance
CloudSec
Computational modeling
contracts
CSP
data analysis
Measurement