A Secure and Efficient Scheme for Cloud Storage against Eavesdropper

Author(s):  
Jian Liu ◽  
Huimei Wang ◽  
Ming Xian ◽  
Kun Huang
2012 ◽  
Vol 3 (3) ◽  
pp. 60-61
Author(s):  
V.Sajeev V.Sajeev ◽  
◽  
R.Gowthamani R.Gowthamani

2017 ◽  
Vol 10 (2) ◽  
Author(s):  
Irfan Santiko ◽  
Rahman Rosidi ◽  
Seta Agung Wibawa

Author(s):  
Rinkle Chhabra ◽  
Anuradha Saini

Mobile Ad Hoc Networks (MANET) are autonomous, infrastructure less and self-configuring networks. MANETs has gained lots of popularity due to on the fly deployment i.e. small network setup time and ability to provide communication in obstreperous terrains. Major challenges in MANETs include routing, energy efficiency, network topology control, security etc. Primary focus in this article is to provide method and algorithm to ensure significant energy savings using re-configurable directional antennas. Significant energy gains can be clinched using directional antenna. Key challenges while using directional antenna are to find destination location, antenna focusing, signal power and distance calculations. Re-configurable directional antenna can ensure significant energy gains if used intelligently. This article provides a brief insight into improved energy savings using re-configurable directional antennas and an associated algorithm


Author(s):  
Neha Thakur ◽  
Aman Kumar Sharma

Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.


Author(s):  
Linlin Li ◽  
Qingchao Wang ◽  
Yanjun Han ◽  
XiaoHui Ma ◽  
Yang Jiao
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document