Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment

    S. Stewart Kirubakaran1,*, V. P. Arunachalam1, S. Karthik1, S. Kannan2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1881-1895, 2023, DOI:10.32604/csse.2023.026690

    Abstract In the present scenario of rapid growth in cloud computing models, several companies and users started to share their data on cloud servers. However, when the model is not completely trusted, the data owners face several security-related problems, such as user privacy breaches, data disclosure, data corruption, and so on, during the process of data outsourcing. For addressing and handling the security-related issues on Cloud, several models were proposed. With that concern, this paper develops a Privacy-Preserved Data Security Approach (PP-DSA) to provide the data security and data integrity for the outsourcing data in Cloud Environment. Privacy preservation is ensured… More >

  • Open Access

    ARTICLE

    Binary Multifold Encryption Technique for Complex Cloud Systems

    N. Ansgar Mary1,*, T. Latha2

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1199-1213, 2022, DOI:10.32604/csse.2022.022404

    Abstract Data security is a major cloud computing issue due to different user transactions in the system. The evolution of cryptography and cryptographic analysis are regarded domains of current research. deoxyribo nucleic acid (DNA) cryptography makes use of DNA as a sensing platform, which is then manipulated using a variety of molecular methods. Many security mechanisms including knowledge-based authentication, two-factor authentication, adaptive authentication, multifactor authentication and single password authentication have been deployed. These cryptographic techniques have been developed to ensure confidentiality, but most of them are based on complex mathematical calculations and equations. In the proposed approach, a novel and unique… More >

Displaying 1-10 on page 1 of 2. Per Page