Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud storage
file
MAZE: A Secure Cloud Storage Service Using Moving Target Defense and Secure Shell Protocol (SSH) Tunneling
Submitted by akarns on Fri, 03/12/2021 - 2:54pm. Contributors:
Vasco Xu
Sherif Khattab
ABSTRACT
Cloud Security
cloud storage
moving target defense
Presentations
biblio
Data Provenance Assurance for Cloud Storage Using Blockchain
Submitted by grigby1 on Tue, 02/23/2021 - 1:26pm
Metrics
data record operations
Digital Forensics
Distributed databases
ethereum
Ethereum blockchain
Forensics
IPFS
metadata
Data Provenances
network accountability
privacy
pubcrawl
resilience
Resiliency
SLA-violations
storage management
storage privacy
cloud-based data provenance
AWS S3 storage
blockchain network
Cloud Computing
cloud data object
cloud forensics
cloud infrastructures
cloud storage
cloud storage forensics
AWS S3
composability
confidential files
contracts
Cryptography
data accountability
data integrity
data privacy
data provenance assurance
biblio
Privacy-Preserving and Efficient Sharing of Drone Videos in Public Safety Scenarios using Proxy Re-encryption
Submitted by aekwall on Mon, 02/15/2021 - 3:50pm
surveillance videos
Proxy Reencryption
pubcrawl
public safety applications
public safety scenarios
realistic simulation environment
Resiliency
road safety
storage management
streaming
Proxy re-encryption
trusted control center
Unmanned Aerial Vehicles
Video communication
video recording
video streaming
video surveillance
video transmission
Videos
encryption
Cloud Computing
cloud storage
composability
Cryptography
cyber physical systems
data privacy
drones
efficient drone video sharing
efficient encryption
autonomous aerial vehicles
Intelligent Transportation Systems
law enforcement
Long Term Evolution
original encryption key
privacy
privacy concerns
privacy preserving
privacy-preserving Sharing
biblio
A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing
Submitted by aekwall on Mon, 02/15/2021 - 3:49pm
Secure storage
party proxy
Performance analysis
private key cryptography
Proxy re-encryption
pubcrawl
re-encrypted cloud data
re-encrypted data
Resiliency
Focusing
Servers
sharing approaches
storage management
system user setting
target user group
telecommunication security
tools
user data
data owner
Broadcasting
Cloud Computing
Cloud Server Provider
cloud storage
composability
conditional proxy broadcast re-encryption technology
cyber physical systems
data encryption
Broadcast Encryption
data privacy
data sharing
dynamic cloud environment
dynamic conditional proxy broadcast re-encryption scheme
dynamic conditional proxy broadcast reencryption scheme
efficient encryption
encryption
fixed system user setup
biblio
Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography
Submitted by aekwall on Mon, 01/25/2021 - 11:58am
hashing functions
Steganography
cloud data
security issue
asymmetric cryptography
Asymmetric Encryption
AES symmetric encryption
compressed data
data encryption phase
data validation phase
symmetric cryptography
information concealment technology
LSB algorithm
LZW algorithm
mixed encryption
RSA asymmetric encryption
SHA hashing algorithm
Steganographic
strong data security
data compression
encrypted data
encryption
hybrid encryption
cloud storage
Resiliency
Human behavior
pubcrawl
composability
Metrics
Cloud Computing
public key cryptography
security improvement
Image coding
information technology
cloud environment
Software algorithms
Image Processing
data storage
biblio
Design of a Cloud Storage Security Encryption Algorithm for Power Bidding System
Submitted by aekwall on Mon, 01/25/2021 - 11:57am
file storage
Tendering and bidding
symmetrical encryption algorithm
symmetric encryption
storage management
Resiliency
public key cryptography
pubcrawl
power system security
power markets
power bidding system
plaintext upload file
Metrics
hybrid encryption method
Human behavior
file upload
AES
file encryption strength
file block
Electricity supply industry
ECC
composability
cloud storage security encryption algorithm
cloud storage files
cloud storage environment
cloud storage
cloud data storage
Cloud Computing
ciphertext file
asymmetric encryption algorithm
Asymmetric Encryption
biblio
Kubestorage: A Cloud Native Storage Engine for Massive Small Files
Submitted by grigby1 on Fri, 12/11/2020 - 2:01pm
large frequency file storage needs
cloud native storage engine
computing instances
Container Orchestration
emerging computing infrastructure
file system store metadata
Haystack
Haystack storage engine
high-frequency file storage needs
Cloud Native infrastructure
network storage server
Object Storage
object storage model
orchestration system
retrieving files
traditional file system
traditional object storage solution
Metadata Discovery Problem
operating systems
resilience
Resiliency
Scalability
Cloud Computing
cloud storage
storage management
application program interfaces
Compositionality
pubcrawl
cloud platform
information retrieval
Kubernetes
Cloud Native
Docker
meta data
Cloud Native applications
biblio
Privacy-Preserving Keyword Search Schemes over Encrypted Cloud Data: An Extensive Analysis
Submitted by aekwall on Mon, 11/23/2020 - 10:21am
Intelligent Data Security
verifiability
storage management
Servers
security
Scalability
Resiliency
remote servers
pubcrawl
privacy-preserving keyword search schemes
privacy issue
privacy
keyword search functions
Keyword search
Big Data
Intelligent Data and Security
Information Leakage
Indexes
encryption
encrypted cloud data
efficiency
data privacy
Cryptography
Compositionality
cloud storage services
cloud storage
Cloud Computing
biblio
Completeness Integrity Protection for Outsourced Databases Using Semantic Fake Data
Submitted by aekwall on Mon, 11/16/2020 - 12:10pm
database management systems
semantic fake data
range query
outsourced databases
Order Preserving Encryption
data integrity problem
data completeness
CPDB
Completeness Protected Database
completeness integrity protection
Outsourced Database Integrity
Outsourced Database
outsourcing
Semantics
Cloud Computing
Data protection
Databases
query processing
Metrics
composability
pubcrawl
Resiliency
data integrity
data privacy
cloud storage
encryption
Cryptography
Servers
biblio
Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data
Submitted by grigby1 on Fri, 07/24/2020 - 11:50am
CP-ABE
collaboration
Identity and Access Management structure
IAM
fine-grained data access control
DUR-CP-ABE
discretionary user revocation
Discretionary Revocation
directory
cloud storage solutions
cloud storage
cloud servers
Ciphertext policy attribute-based encryption
batch revocation functionality
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
Cryptography
policy-based governance
pubcrawl
encrypted data
storage management
cryptographic solutions
Organizations
Scalability
Servers
cloud data
Cloud Computing
authorisation
Access Control
encryption
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »