2015
DOI: 10.1007/978-81-322-2526-3_42
|View full text |Cite
|
Sign up to set email alerts
|

Implementing DNA Encryption Technique in Web Services to Embed Confidentiality in Cloud

Abstract: Hottest buzzword of this decade is "Cloud Computing"-which has been considered as one of the potential solutions to our increasing demand for accessing, processing, storing, and using provisioned resources over the internet. However, with so many boons, it comes along with some curses as security and trust issues. There are many security issues within the cloud, and Information disclosure is a big threat to a cloud user when the information is transferred over the network using web services. In this paper, we … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(1 citation statement)
references
References 10 publications
(10 reference statements)
0
1
0
Order By: Relevance
“…Damiani et al [29] presented an access control model to protect information distributed on the Web that, by exploiting XML's own capabilities, enables the definition and enforcement of access restrictions directly on the structure and content of the documents. Gugnani et al [31] provided confidentiality to the user while using cloud-based Web services. Zhu et al [34] proposed a scheme of data integrity verification based on a short signature algorithm (ZSS signature), which supports privacy protection and public auditing by introducing a trusted third party (TPA) to ensure data integrity and availability in the cloud and IoT storage systems.…”
Section: Related Workmentioning
confidence: 99%
“…Damiani et al [29] presented an access control model to protect information distributed on the Web that, by exploiting XML's own capabilities, enables the definition and enforcement of access restrictions directly on the structure and content of the documents. Gugnani et al [31] provided confidentiality to the user while using cloud-based Web services. Zhu et al [34] proposed a scheme of data integrity verification based on a short signature algorithm (ZSS signature), which supports privacy protection and public auditing by introducing a trusted third party (TPA) to ensure data integrity and availability in the cloud and IoT storage systems.…”
Section: Related Workmentioning
confidence: 99%