Results 11 to 20 of about 433,812 (307)

Study of Efficient Cloud Storage Architectures for the Security Environment

open access: yesJournal of Kufa for Mathematics and Computer, 2023
Lately, cloud computing has acquired notoriety. Data storage is an essential and beneficial area of concentrate in cloud computing. The term "cloud data storage" describes the process of transferring data to an external, up-to-date storage system.
Ayad Hasan Adhab, Naseer Ali Hussien
doaj   +1 more source

Improved cloud storage auditing scheme with deduplication

open access: yesMathematical Biosciences and Engineering, 2023
Cloud storage has become a crucial service for many users who deal with big data. The auditing scheme for cloud storage is a mechanism that checks the integrity of outsourced data.
Jindan Zhang   +3 more
doaj   +1 more source

Formation of a kind of heavy‐precipitation‐producing mesoscale vortex around the Sichuan Basin: An along‐track vorticity budget analysis

open access: yesAtmospheric Science Letters, 2020
This study investigates the formation of a type of mesoscale vortex around the Sichuan Basin (i.e., the southwest vortex [SWV]) that usually induces heavy precipitation, based on a semi‐idealized simulation of eight similar SWV‐formation events.
Shuang‐Lei Feng   +4 more
doaj   +1 more source

Privacy-Preserving Ciphertext-Policy Attribute-Based Search over Encrypted Data in Cloud Storage

open access: yesJournal of Computer Science and Technology, 2023
Cloud storage is one of the cloud computing services which allows data users to store their data remotely to the cloud. Thus, most individuals, institutions, and organizations are outsourcing their data to the cloud.
Uma Sankararao Varri
doaj   +1 more source

SHORTENING REHABILITATION PROCESS OF PATIENTS USING IT-BASED TECHNOLOGY

open access: yesInternational Journal of Physiotherapy, 2019
Background: In today's world, the application of information and communication technology is rapidly expanding and has transformed all aspects of life, including education, into its different forms, to the point where knowledge production is virtually ...
Seyed Siavash Sarkeshik
doaj   +1 more source

Performance and time improvement of LT code-based cloud storage

open access: yesEURASIP Journal on Wireless Communications and Networking, 2022
Outsourcing data on cloud storage services has already attracted great attention due to the prospect of rapid data growth and storing efficiencies for customers.
Nastaran Chakani   +2 more
doaj   +1 more source

Research Progress on Blockchain-based Cloud Storage Security Mechanism [PDF]

open access: yesJisuanji kexue, 2021
Cloud storage enables users to obtain cheap online storage services on demand through network connection anytime and anywhere.However,due to the untrustability of cloud service providers,third-party institutions and users as well as the inevitable ...
XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan
doaj   +1 more source

Recovering Residual Forensic Data from Smartphone Interactions with Cloud Storage Providers [PDF]

open access: yes, 2015
There is a growing demand for cloud storage services such as Dropbox, Box, Syncplicity and SugarSync. These public cloud storage services can store gigabytes of corporate and personal data in remote data centres around the world, which can then be ...
Amazon Web Services   +53 more
core   +1 more source

A Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption

open access: yesIEEE Access, 2021
Cloud storage service has shown its great power and wide popularity which provides fundamental support for rapid development of cloud computing. However, due to management negligence and malicious attack, there still lie enormous security incidents that ...
Heqing Song, Jifei Li, Haoteng Li
doaj   +1 more source

Using smartphones as a proxy for forensic evidence contained in cloud storage services [PDF]

open access: yes, 2013
Cloud storage services such as Dropbox, Box and SugarSync have been embraced by both individuals and organizations. This creates an environment that is potentially conducive to security breaches and malicious activities.
Glisson, W., Grispos, G., Storer, T.
core   +2 more sources

Home - About - Disclaimer - Privacy