2016 International Conference on Communication and Electronics Systems (ICCES) 2016
DOI: 10.1109/cesys.2016.7889842
|View full text |Cite
|
Sign up to set email alerts
|

Secure cloud auditing over encrypted data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…An account is provided to the user that is controlled by the web application to set an alarm for the right time to take medicine with the right dosage. The user data about the medicine dispatched and the time at which the medicine is dispatched is recorded and stored in the machine for the future reference and the next appointment with the doctor is can also reminded by using the display unit in the system the concept of medicine dispatching unit are taken from this paper [3].…”
Section: Literature Surveymentioning
confidence: 99%
“…An account is provided to the user that is controlled by the web application to set an alarm for the right time to take medicine with the right dosage. The user data about the medicine dispatched and the time at which the medicine is dispatched is recorded and stored in the machine for the future reference and the next appointment with the doctor is can also reminded by using the display unit in the system the concept of medicine dispatching unit are taken from this paper [3].…”
Section: Literature Surveymentioning
confidence: 99%
“…Cloud provides handling and maintaining large group of remote servers to be in a network, which is allowed the centralized data repository and access to the computer services or resources whenever required [1]. The user is concerned about the integrity of data stored in the cloud can be hacked or modified by outside attackers [2].…”
Section: Introductionmentioning
confidence: 99%