Ismail et al., 2024 - Google Patents
Enhancing Cloud Security: Strategies and Technologies for Protecting Data in Cloud EnvironmentsIsmail et al., 2024
View PDF- Document ID
- 17002261353001780208
- Author
- Ismail A
- Siham E
- Publication year
- Publication venue
- International Journal of Applied Mathematics, Computational Science and Systems Engineering
External Links
Snippet
With the rapid adoption of cloud computing, ensuring the security of data has become a paramount concern for organizations of all sizes. This paper explores various strategies and technologies for protecting data in cloud environments. Encryption emerges as a …
- 238000005516 engineering process 0 title abstract description 5
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Seth et al. | Integrating encryption techniques for secure data storage in the cloud | |
| Ibrahim et al. | Data security in cloud computing with elliptic curve cryptography | |
| Zissis et al. | Addressing cloud computing security issues | |
| Aldossary et al. | Data security, privacy, availability and integrity in cloud computing: issues and current solutions | |
| Parashar et al. | Secure user data in cloud computing using encryption algorithms | |
| US8806200B2 (en) | Method and system for securing electronic data | |
| EP2396921B1 (en) | Trusted cloud computing and services framework | |
| Sugumaran et al. | An architecture for data security in cloud computing | |
| EP2396922A2 (en) | Trusted cloud computing and services framework | |
| Agarwal et al. | A survey on cloud computing security issues and cryptographic techniques | |
| Kulkarni et al. | Security frameworks for mobile cloud computing: A survey | |
| Rakhra et al. | Digital signature verification in cloud computing | |
| CN115549906A (en) | Privacy calculation method, system, device and medium based on block chain | |
| Balasubramaniam et al. | A survey on data encryption tecniques in cloud computing | |
| Patel et al. | Cryptographic Trust Models and Zero-Knowledge Proofs for Secure Cloud Access Control and Authentication | |
| Ismail et al. | Enhancing Cloud Security: Strategies and Technologies for Protecting Data in Cloud Environments | |
| Purushothama et al. | Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud | |
| Gunadham et al. | Security concerns in cloud computing for knowledge management systems | |
| CN118504003A (en) | A personal information encryption storage system based on blockchain technology | |
| Karunakaran et al. | Blockchain technology in cloud security | |
| Soman et al. | Analysis of hybrid data security algorithms for cloud | |
| Vijay et al. | An extended infrastructure security scheme for multi-cloud systems with verifiable inter-server communication protocol | |
| Apostol et al. | A survey on privacy enhancements for massively scalable storage systems in public cloud environments | |
| Siopi et al. | DeCStor: A Framework for Privately and Securely Sharing Files Using a Public Blockchain | |
| Sohal et al. | Comparative Analysis of Different Cryptographic Mechanisms of Data Security and Privacy in Cloud Environment |