2015 International Conference on Green Computing and Internet of Things (ICGCIoT) 2015
DOI: 10.1109/icgciot.2015.7380514
|View full text |Cite
|
Sign up to set email alerts
|

Three step data security model for cloud computing based on RSA and steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(35 citation statements)
references
References 0 publications
0
35
0
Order By: Relevance
“…The method significantly focused on the I/O data balancing and outcomes with better potential results. Pant et al [5] presented the three step cloud data security by encryption methods. The method helps in secure data storing mechanism of steganography and cryptography.…”
Section: Existing Work Over Privacy and Security Issues Of Big Data mentioning
confidence: 99%
See 1 more Smart Citation
“…The method significantly focused on the I/O data balancing and outcomes with better potential results. Pant et al [5] presented the three step cloud data security by encryption methods. The method helps in secure data storing mechanism of steganography and cryptography.…”
Section: Existing Work Over Privacy and Security Issues Of Big Data mentioning
confidence: 99%
“…Pant et al [5] The [9] the sharing of big data with i-cloud in point of efficiency and economic point of view…”
Section: Big Data Analysis Based On Private Cloudmentioning
confidence: 99%
“…Since, by the usage of cloud, distributed access of the data is possible, at the same time, data breaches are also highly possible. In order to safeguard the data, many applications have been coined in the literature which includes methodologies based on cryptography, [1], [2], [3], [4], [5], privacy preserving techniques [6], [7], [8], knowledge based authentication techniques, possession based authentication techniques emit these methods, each one of the methodologies has their own limitations with respect to provision of security [9], [10], [11]. Therefore, to overcome these limitations, methodologies based on biometric authentication has been popular [12], [13], [14].…”
Section: Introductionmentioning
confidence: 99%
“…Data confidentiality entails preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information [30]. Cloud computing has been recognized as a next generation information technology model that could help businesses and individuals fulfil their requirements.…”
Section: Confidentiality and Privacymentioning
confidence: 99%