2020
DOI: 10.1109/access.2020.3039163
|View full text |Cite
|
Sign up to set email alerts
|

Secure Outsourcing and Sharing of Cloud Data Using a User-Side Encrypted File System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…Moreover, the authentication scheme for the group that is based on every user's identity can assure the security of the network before the data is being shared. Additionally, the network operations that are regular remain unaffected and are not damaged due to the incidents that happen over the process of authentication [23]. The data involves text files that are plain, images of various sizes and formats as well as multimedia files.…”
Section: Figure 1 Cloud Security Componentmentioning
confidence: 99%
“…Moreover, the authentication scheme for the group that is based on every user's identity can assure the security of the network before the data is being shared. Additionally, the network operations that are regular remain unaffected and are not damaged due to the incidents that happen over the process of authentication [23]. The data involves text files that are plain, images of various sizes and formats as well as multimedia files.…”
Section: Figure 1 Cloud Security Componentmentioning
confidence: 99%
“…Protocol selection, routing decisions, and the implementation of security measures are customized to align with the unique demands of specific applications and network requirements. Notably, security measures such as encryption and authentication, have gained increased significance considering the inherent vulnerabilities and efficiency overheads associated with the existing security protocols in WSNs [33].…”
Section: A Overview Of Wsn Architecturementioning
confidence: 99%
“…Each proposed architecture must satisfy security requirements such as authentication, integrity, and availability, which are more targeted [55]. In the proposed dedicated architecture for a distributed university network, the confidentiality of learning records is protected against unauthorized users and untrusted storage.…”
Section: Resistance To Attackmentioning
confidence: 99%