2009
DOI: 10.1016/j.ins.2009.05.013
|View full text |Cite
|
Sign up to set email alerts
|

Online data storage using implicit security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
45
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 72 publications
(51 citation statements)
references
References 20 publications
0
45
0
Order By: Relevance
“…Remaking of the information requires access to every server and the information as to which servers the information parcels are put away. A few varieties of this plan are depicted, which incorporate the certain capacity of encryption keys as opposed to the information, and where a subset of the segments might be united to reproduce the information [11].…”
Section: F Online Data Storage Using Implicit Securitymentioning
confidence: 99%
“…Remaking of the information requires access to every server and the information as to which servers the information parcels are put away. A few varieties of this plan are depicted, which incorporate the certain capacity of encryption keys as opposed to the information, and where a subset of the segments might be united to reproduce the information [11].…”
Section: F Online Data Storage Using Implicit Securitymentioning
confidence: 99%
“…Regular techniques for ensuring client information incorporate encryption preceding storage [9], client validation methodology before capacity or recovery, and building secure channels for information transmission. These insurance systems regularly oblige cryptography calculations and advanced mark strategies, as clarified underneath.…”
Section: Related Workmentioning
confidence: 99%
“…Parakh and Kak [5] have shown that the traditional approach of security (explicit), whose data are stored on a single server and access to these data by a password, which is generally simple and memorable for most users, facilitated the attacks and intrusions on these data sources.…”
Section: ) Problems Of Data Securitymentioning
confidence: 99%
“…Parakh and Kak [5] considered that the traditional approach to securing data is to store and back it up on a single server and allows the access upon the use of passwords that are needed to be frequently changed. However, there is a tendency among users to keep passwords simple and memorable leading to the possibility of brute force attacks.…”
Section: ) Solutions Based On Data Partitioning Schemementioning
confidence: 99%