The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Cryptic Algorithms: Hiding Sensitive Information in Cloud Computing
Abstract
Users that utilise cloud storage for various services can keep their files on the cloud and share their data with others. To ensure the integrity of data saved in cloud storage, a remote data integrity auditing method is employed. There are several methods for concealing sensitive information, but the most effective to date has been the use of a remote data integrity auditing technique. Another approach is to develop a remote data integrity auditing method that allows data exchange while keeping sensitive information hidden in this article. In this approach, a sanitizer module will sanitise the data blocks from the huge quantity of data saved that correspond to the file's sensitive information. In integrity auditing, this sanitised data is utilised to confirm the file's integrity. Outcome produced in the project makes this file stored in the cloud storage able to be shared and used by public users on the terms that the sensitive information is covered, where the remote data integrity auditing is still executed efficiently.
Related Content
Princy Pappachan, Sreerakuvandana, Mosiur Rahaman.
© 2024.
26 pages.
|
Winfred Yaokumah, Charity Y. M. Baidoo, Ebenezer Owusu.
© 2024.
23 pages.
|
Mario Casillo, Francesco Colace, Brij B. Gupta, Francesco Marongiu, Domenico Santaniello.
© 2024.
25 pages.
|
Suchismita Satapathy.
© 2024.
19 pages.
|
Xinyi Gao, Minh Nguyen, Wei Qi Yan.
© 2024.
13 pages.
|
Mario Casillo, Francesco Colace, Brij B. Gupta, Angelo Lorusso, Domenico Santaniello, Carmine Valentino.
© 2024.
30 pages.
|
Pratyay Das, Amit Kumar Shankar, Ahona Ghosh, Sriparna Saha.
© 2024.
32 pages.
|
|
|