Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "cloud data security" wg kryterium: Temat


Wyświetlanie 1-7 z 7
Tytuł:
A cryptographic security mechanism for dynamic groups for public cloud environments
Autorzy:
Malviya, Sheenal
Dave, Sourabh
Bandhu, Kailash Chandra
Litoriya, Ratnesh
Powiązania:
https://bibliotekanauki.pl/articles/27314248.pdf
Data publikacji:
2022
Wydawca:
Sieć Badawcza Łukasiewicz - Przemysłowy Instytut Automatyki i Pomiarów
Tematy:
cloud computing
cloud data security
dynamic groups
homomorphic encryption
chaotic network
throughput
avalanche effect
Opis:
Cloud computing has emerged as a significant technology domain, primarily due to the emergence of big data, machine learning, and quantum computing applications. While earlier, cloud computing services were focused mainly on providing storage and some infrastructures/ platforms for applications, the need to advance computational power analysis of massive datasets. It has made cloud computing almost inevitable from most client-based applications, mobile applications, or web applications. The allied challenge to protect data shared from and to cloud-based platforms has cropped up with the necessity to access public clouds. While conventional cryptographic algorithms have been used for securing and authenticating cloud data, advancements in cryptanalysis and access to faster computation have led to possible threats to the traditional security of cloud mechanisms. This has led to extensive research in homomorphic encryption pertaining to cloud security. In this paper, a security mechanism is designed targeted towards dynamic groups using public clouds. Cloud security mechanisms generally face a significant challenge in terms of overhead, throughput, and execution time to encrypt data from dynamic groups with frequent member addition and removal. A two-stage homomorphic encryption process is proposed for data security in this paper. The performance of the proposed system is evaluated in terms of the salient cryptographic metrics, which are the avalanche effect, throughput, and execution time. A comparative analysis with conventional cryptographic algorithms shows that the proposed system outperforms them regarding the cryptographic performance metrics.
Źródło:
Journal of Automation Mobile Robotics and Intelligent Systems; 2022, 16, 2; 46--54
1897-8649
2080-2145
Pojawia się w:
Journal of Automation Mobile Robotics and Intelligent Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Chmura obliczeniowa dla logistyki – projekt LOGICAL
Architecture of computing cloud – LOGICAL project
Autorzy:
Korczak, Jerzy
Powiązania:
https://bibliotekanauki.pl/articles/432039.pdf
Data publikacji:
2014
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
cloud computing architecture
logistic services
cloud portal
data security
Opis:
This paper describes the organization of the local cloud computing environment at the University of Leipzig and Wrocław University of Economics, developed in the framework of the LOGICAL research project. In particular, the architecture of the main components of the cloud portal are described as well as their references to VMWare software. An example of logistics application – LogBase on Demand − is shortly presented.
Źródło:
Informatyka Ekonomiczna; 2014, 2(32); 95-105
1507-3858
Pojawia się w:
Informatyka Ekonomiczna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Augmenting The Cloud Environment Security Through Blockchain Based Hash Algorithms
Autorzy:
Ravi Kanth, Motupalli
Krishna, Prasad K.
Powiązania:
https://bibliotekanauki.pl/articles/24083575.pdf
Data publikacji:
2023
Wydawca:
Politechnika Lubelska. Instytut Informatyki
Tematy:
cloud security
data privacy
data confidentiality
hash algorithm
substitutional encryption
Opis:
Many techniques and algorithms are developed to enhance the security in the cloud environment. This helps the users to secure their server from malicious attacks. Hence the study and investigation of the performance enhanced security algorithms is a must demanded field in the research industry. When large number users using same server to store their information in cloud environment security is a must needed component to preserve the privacy and confidentiality of every individual user. This can be further strengthened by detecting the attacks in earlier stages and taking countermeasure to prevent the attack. Thus securing the data network without any leakage and loss of the information is a challenging task in the cloud environment. When the attacks or intrusion is detected after the occurrence there may be damage to the data in the form of data damage or theft. Hence it is necessary to predict and detect the attacks before the occurrence to protect the privacy and confidentiality of the user information.
Źródło:
Journal of Computer Sciences Institute; 2023, 26; 1--6
2544-0764
Pojawia się w:
Journal of Computer Sciences Institute
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cloud architecture for logistic services
Architektura chmury obliczeniowej dla aplikacji i serwisów logistycznych
Autorzy:
Korczak, J.
Lipiński, P.
Powiązania:
https://bibliotekanauki.pl/articles/404992.pdf
Data publikacji:
2013
Wydawca:
Politechnika Częstochowska
Tematy:
cloud computing
logistic service
cloud portal
data security
data confidentiality
chmura obliczeniowa
serwis logistyczny
portal aplikacji
bezpieczeństwo danych
poufność danych
Opis:
This paper concerns organization of the local cloud computing environment at the Wroclaw University of Economics, developed in the framework of the LOGICAL research project. In particular the architecture of the environment, the implementation of main components of the environment are described as well as their references to the global cloud computing environment and the general architecture of the VMWare platform.
Artykuł przedstawia organizację chmury obliczeniowej zaprojektowanej w ramach projektu LOGICAL (program Central Europe) i wdrożonej na Uniwersytecie Ekonomicznym we Wrocławiu. W szczególności opisano architekturę platformy, jej główne komponenty i usługi oraz platformę VMWare. Przedstawiona chmura obliczeniowa jest zorientowana na usługi i aplikacje dla małych i średnich przedsiębiorstw logistycznych w Europie Centralnej. Projekt LOGICAL jest w trakcie realizacji, jego zakończenie planuje się na koniec 2014 roku.
Źródło:
Polish Journal of Management Studies; 2013, 8; 132-140
2081-7452
Pojawia się w:
Polish Journal of Management Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Tokenization as a data security technique
Autorzy:
Ogigau-Neamtiu, F.
Powiązania:
https://bibliotekanauki.pl/articles/119803.pdf
Data publikacji:
2016
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cloud computing
data security
encryption
obfuscation
chmura obliczeniowa
ochrona danych
szyfrowanie
zaciemnianie
Opis:
Nowadays, organisations, especially those which embrace the modern cloud computing technology, are facing the complex challenge of securing their data assets while providing modern IT services. Classical solutions for ensuring data security have consistent limitations in modern platforms due to factors like data sharing requirements, multi-tenancy, dynamic environment, high availability and reliability requirements, etc. One approach to address this problem is to implement encryption mechanisms which will provide the required security, but they depend on substantial investments in hardware and/or software and add supplementary complexity to those systems. This article analyses tokenization as an alternative strategy for ensuring data security in modern cloud computing systems by implementing mechanisms to hide sensitive data and restrict access to it. Tokenization systems are more easy to implement and can be used extensively for ensuring data security in IT systems.
Źródło:
Zeszyty Naukowe AON; 2016, 2(103); 124-135
0867-2245
Pojawia się w:
Zeszyty Naukowe AON
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Bezpieczeństwo oraz aspekty prawne przetwarzania danych w chmurze obliczeniowej
Autorzy:
Agnieszka, Grzegorek,
Powiązania:
https://bibliotekanauki.pl/articles/902857.pdf
Data publikacji:
2018-04-13
Wydawca:
Uniwersytet Warszawski. Wydawnictwa Uniwersytetu Warszawskiego
Tematy:
cloud computing
EU law
data protection
data security
privacy
Service Level Agreements
przetwarzanie w chmurze
prawo UE
ochrona danych
bezpieczeństwo danych
prywatność
Opis:
Many issues need to be considered and tackled before moving data into the cloud. Adoption of cloud computing raises concerns and questions in particular with respect to security, control and privacy in cloud computing environment. Users should be aware where their data will be stored and what law governs. In a case where personal data are to be processed it is important for the contracting parties to ensure that requirements and obligations placed on them pursuant to the EU data protection laws will be fulfilled. This article also includes an overview of typical terms and conditions of cloud computing contracts, stressing that most of contractual arrangements in current practice fall short of achieving a fair balance of rights and obligations arising under the contract between cloud providers and users. The aim of this study is to indicate regulations and guidelines which are applicable to cloud computing contracts as well as initiatives undertaken at the EU level and their role in building legal certainty and trust to cloud computing technology.
Źródło:
Studia Iuridica; 2017, 72; 149-163
0137-4346
Pojawia się w:
Studia Iuridica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Bezpieczeństwo przetwarzania danych w technologii cloud computing w administracji publicznej
Security of Data Processing in the Cloud Computing Technology in Public Administration
Autorzy:
Hauke, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/590634.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Ekonomiczny w Katowicach
Tematy:
Administracja publiczna
Bezpieczeństwo danych
Chmura obliczeniowa
e-administracja
Przetwarzanie danych
Technologia informacyjna
Cloud computing
Data processing
Data security
e-government
Information Technology (IT)
Public administration
Opis:
Cloud Computing (CC) is a technology that is the result of the evolution of information technology. She became very popular after 2010. Although historically speaking the elements CC you can see in the 70's-80's. An example would be e-mail, which was and is implemented on the server-wide access. Users utilize software resources coupled angular and hard disk space to store the information. The development of technology has contributed to the fact that the experience of the use of electronic mail are transferred to other uses not only non-commercial, but commercial. The various segments of the economy, you can see the technology implemented CC. They include public administration. Because of their specific operating and construction - from the local to the central - the use of economically and organizational causing that induces a lot of emotion. However, these positive emotions should be verified by the environment, which sees information resources as a source of obtaining illegal profit or as an element of revenge on the organization. But it is not only the negative aspects of CC. The problem may be the service provider, who may perceive the technology of CC as a quick source of enrichment. Therefore it is important to the safety of this technology in the processing of information. To date, there are no legal arrangements at the macro level as seen from the point of legal responsibility of service providers. Some solutions that we can see today are of a local nature. This article will discuss some aspects of security of information processing using CC technology in public administration.
Źródło:
Studia Ekonomiczne; 2014, 199; 58-65
2083-8611
Pojawia się w:
Studia Ekonomiczne
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-7 z 7

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies