2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT) 2017
DOI: 10.1109/iceeccot.2017.8284517
|View full text |Cite
|
Sign up to set email alerts
|

A novel data auditing approach to achieve data privacy and data integrity in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(14 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…When health data are collected and processed across heterogeneous networks, it requires compliance using a template, as well as defining data requested for certain applications. To achieve this, it is required to be able to send an automatic data request for immediate inquiries, including data integrity to inference in cloud storage to verify the integrity of a third party for security purposes [11][12][13], when an additional request should be sent out to all networks. We will implement and experiment to measure the network response time with accuracy in this case, as well as how accurately the proposed method can provide the best optimized data sampling at large scale using big data in the cloud server, which may be located in a centralized location, in the context of software defined network (SDN) infrastructure with fault tolerant mechanisms [14,15].…”
Section: Discussionmentioning
confidence: 99%
“…When health data are collected and processed across heterogeneous networks, it requires compliance using a template, as well as defining data requested for certain applications. To achieve this, it is required to be able to send an automatic data request for immediate inquiries, including data integrity to inference in cloud storage to verify the integrity of a third party for security purposes [11][12][13], when an additional request should be sent out to all networks. We will implement and experiment to measure the network response time with accuracy in this case, as well as how accurately the proposed method can provide the best optimized data sampling at large scale using big data in the cloud server, which may be located in a centralized location, in the context of software defined network (SDN) infrastructure with fault tolerant mechanisms [14,15].…”
Section: Discussionmentioning
confidence: 99%
“…Where,  denotes the activation function. Therefore, the output attained from the first RBM is expressed as equation (18).…”
Section: Commented [Hp12]mentioning
confidence: 99%
“…CC is a paradigm where the resources of computing are shared as a cloud service on the internet [18]. CC is used in many organizations in the worldwide level as it supports computation and data storage with high performance.…”
Section: Introductionmentioning
confidence: 99%
“…Through signal theory, they identify which are the keys that most influence its effectiveness. Agarkhed and Ashalatha 25 and Hiremath and Kunte 26 described a dedicated framework for data storage auditing in the cloud. Agarkhed and Ashalatha 25 provided auditing to check the correctness of outsourced data avoiding that information could be accessed by unauthorized users or hackers in the unsecured cloud network.…”
Section: Related Workmentioning
confidence: 99%