2022
DOI: 10.11591/eei.v11i2.3344
|View full text |Cite
|
Sign up to set email alerts
|

Storage and encryption file authentication for cloud-based data retrieval

Abstract: The amount of data that must be processed, stored, and modified rises as time passes. An enormous volume of data from a wide range of sources must be stored on a safe platform. Maintaining such a large volume of data on a single computer or hard drive is impracticable. As a result, the cloud is the ideal platform for storing any quantity of data. An advantage of storing data in the cloud is that it may be accessed at any time and from any device. However, the security of data stored in the cloud is a big conce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…It is the Mechanism eZdsp F28335 for automatically connecting the service interfaces of the simulation between the application and the relevant software components with the intention of making use of them in virtual environments. Because of this, the procedure is made simpler and takes up less time, both of which ultimately contribute to the achievement [21].…”
Section: Experimental Results and Discussion At (Abcnn Online By Usin...mentioning
confidence: 99%
“…It is the Mechanism eZdsp F28335 for automatically connecting the service interfaces of the simulation between the application and the relevant software components with the intention of making use of them in virtual environments. Because of this, the procedure is made simpler and takes up less time, both of which ultimately contribute to the achievement [21].…”
Section: Experimental Results and Discussion At (Abcnn Online By Usin...mentioning
confidence: 99%
“…Fast download rates, worldwide storage, security, and data preservation are just a few of the benefits of IPFS. The features are as follows: IPFS simply considers the content of the file, creating a unique hash mark from it that can be accessed by the mark's uniqueness and checked beforehand to see whether it has already been stored [11]. It is obviously read from several other nodes if it was already stored, conserving space in the process.…”
Section: Inter-planetary File System (Ipfs)mentioning
confidence: 99%
“…chief security officer (CSO) security management at the management level can be aided by using risk scenarios to evaluate the security threat to an information system, and some sample attack scenarios are presented. Due to the findings of this study, security measures for network control systems have been significantly bolstered, and weaknesses in the system's design due to hardware and software defects have become the primary target of [6].…”
Section: Introductionmentioning
confidence: 98%