Secure Cloud Storage Protocols with Data Dynamics Using Secure Network Coding Techniques [PDF]
In the age of cloud computing, cloud users with limited storage can outsource their data to remote servers. These servers, in lieu of monetary benefits, offer retrievability of their clients' data at any point of time. Secure cloud storage protocols enable a client to check integrity of outsourced data.
arxiv +1 more source
Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues
With the explosive growth of Internet of Things devices and massive data produced at the edge of the network, the traditional centralized cloud computing model has come to a bottleneck due to the bandwidth limitation and resources constraint.
Jiale Zhang+4 more
semanticscholar +1 more source
Classification of Various Security Techniques in Databases and their Comparative Analysis [PDF]
Data security is one of the most crucial and a major challenge in the digital world. Security, privacy and integrity of data are demanded in every operation performed on internet. Whenever security of data is discussed, it is mostly in the context of secure transfer of data over the unreliable communication networks.
arxiv
Distributed storage for data security [PDF]
5 pages, submitted to ITW ...
Annina Bracher, Amos Lapidoth, Eran Hof
openaire +3 more sources
Secure contexts for confidential data [PDF]
Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low level users, even in the presence of any possible malicious process. This requirement could be too demanding when some knowledge about the environment (context) in which the process is going to run is available.
BOSSI A.+3 more
openaire +4 more sources
Chaotic iterations versus Spread-spectrum: topological-security and stego-security [PDF]
A new framework for information hiding security, called topological-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to information leaks. It has been proven that spread-spectrum techniques, a well-known stego-secure
arxiv
Ghosts of Deletions Past: New Secure Deletion Challenges and Solutions [PDF]
Is secure deletion of data still a problem?
arxiv
Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities
Benefiting from the advancement of algorithms in massive data and powerful computing resources, deep learning has been explored in a wide variety of fields and produced unparalleled performance results.
Guowen Xu+4 more
semanticscholar +1 more source
Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to information leaks.
arxiv
Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption [PDF]
Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the average end user.
arxiv