2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application 2010
DOI: 10.1109/imsaa.2010.5729397
|View full text |Cite
|
Sign up to set email alerts
|

Secure data access in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0
1

Year Published

2012
2012
2016
2016

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 66 publications
(29 citation statements)
references
References 10 publications
0
28
0
1
Order By: Relevance
“…Bracci et al [28] propose to provide adequate encryption and key management support by using a real use case of Vitaever, i.e., a home health-care SaaS application deployed on Amazon AWS. Sanka et al [29] propose symmetric key sharing between CSP and the user by using the Diffie-Hellman key exchange protocol. The authors make a lot of assumptions, which can be potentially harmful in the real-world scenario.…”
Section: Focused Security Solutions For Cloud Databasesmentioning
confidence: 99%
“…Bracci et al [28] propose to provide adequate encryption and key management support by using a real use case of Vitaever, i.e., a home health-care SaaS application deployed on Amazon AWS. Sanka et al [29] propose symmetric key sharing between CSP and the user by using the Diffie-Hellman key exchange protocol. The authors make a lot of assumptions, which can be potentially harmful in the real-world scenario.…”
Section: Focused Security Solutions For Cloud Databasesmentioning
confidence: 99%
“…In [49], authors propose the use of symmetric key encryption mechanism for data security in Cloud framework. In [50], authors propose the use of Public Key Infrastructure for the Cloud framework. However, these approaches do not provide an efficient solution for key management due to its complexity.…”
Section: Encryption and Key Management Algorithmsmentioning
confidence: 99%
“…They leverage a generative process of two types of errors (false positive and false negative) by modeling two different aspects of source quality. Authors in paper [12] show how to protect the data files of a data owner in the cloud infrastructure by a set of security protocols, which are only accessible by a valid user. To protect the outsourced information, the paper explains how to combine access control and cryptography.…”
Section: Related Workmentioning
confidence: 99%