Secure Logging As a Service -Delegating Log Management to the Cloud Abstract?Secure Logging As a Service -Delegating Log Management to the Cloud. Securely maintaining log records over extended periods of time is very important to the proper functioning of any organization. Integrity of the log files and that of the logging process need to be…
Secure Logging As a Service?Delegating Log Management to the CloudLog files helps cyber forensic process in inquiring and seizing computer, obtaining electronic evidence for criminal investigations and maintaining computer records for the federal rules of evidence. So it can be said that logging is closely related to Forensic Computing. To make the logs permissible for…
Secure multi-receiver data exchange for OSNs using predicate encryption Abstract-Online Social Network is an extremely prevalent administration among utilizations of the web and distributed computing. Security assurance has turned into a noteworthy issue in light of the fact that a considerable measure of individual data is put away on the OSN stage. To make proceeded…
Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things Abstract-Ciphertext-policy attribute-based keyword search (CP-ABKS) schemes facilitate the fine-grained keyword search over encrypted data, such as those sensed/collected from Industrial Internet of Things (IIoT) devices and stored in the cloud. However, existing CP-ABKS schemes generally have significant computation and storage requirements, which are beyond…
Secure Overlay Cloud Storage with Access Control and Assured Deletion document preparation Abstract? We can now outsource data backups off-site to third-party cloud storage services so as to reduce data management costs. However, we must provide security guarantees for the outsourced data, which is now maintained by third parties. We design and implement FADE, a…
Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach Abstract? Key pre-distribution algorithms have recently emerged as efficient alter natives of key management in today?s secure communications landscape. Secure routing techniques using key pre-distribution algorithms require special algorithms capable of finding optimal secure over lay paths. To the best of our knowledge, the…
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT Abstract-Phrase search allows retrieval of documents containing an exact phrase, which plays an important role in many machine learning applications for cloud-based IoT, such as intelligent medical data analytics. In order to protect sensitive information from being leaked by service providers, documents (e.g.,…
₹6,000Original price was: ₹6,000.₹5,000Current price is: ₹5,000.
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT Abstract-Phrase search allows retrieval of documents containing an exact phrase, which plays an important role in many machine learning applications for cloud-based IoT, such as intelligent medical data analytics. In order to protect sensitive information from being leaked by service providers, documents (e.g.,…
Secure Routing for Mobile Ad hoc Networks Abstract?Abstract technology advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly,evolve to autonomous networks. In either case, the proliferation of MANET-based applications depends on a multitude of factors, with trustworthiness being one of the primary…
Secure Sensitive Data Sharing on a Big Data Platform Abstract? Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services. However, secure data sharing is problematic. This paper proposes a framework for secure…
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications Abstract– Internet of Things (IoT) is a network of all devices that can be accessed through the internet. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with the physical world. This also reduces…
Secure Solution for Mobile Access to Patient?s Health Care Record Abstract?Secure Solution for Mobile Access to Patient?s Health Care Record. Mobile devices are today widely accepted and their capability to provide access to services independent of user time and location make them well suited for provision of healthcare services to both patients and healthcare…