Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
Nowadays, organizations produce a huge amount of sensitive data, such as personal information, financial data, and electronic health records. Consequently, the amount of digital data produced has increased correspondingly and often overwhelmed the data storage capacity of many organizations. The ma...
| Main Author: | Sookhak, Mehdi |
|---|---|
| Format: | Thesis |
| Published: |
2015
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/5850/ http://studentsrepo.um.edu.my/5850/1/DYNAMIC_REMOTE_DATA_AUDITING_FOR_SECURING_BIG_DATA_STORAGE_IN_CLOUD_COMPUTING.pdf |
Similar Items
Big data security
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security
by: Manjunatha, V., et al.
Published: (2024)
by: Manjunatha, V., et al.
Published: (2024)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Risk assessment for Big Data in cloud computing: trust as an impact
by: Yusof Ali, Hazirah Bee, et al.
Published: (2019)
by: Yusof Ali, Hazirah Bee, et al.
Published: (2019)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Two objectives big data task scheduling using swarm intelligence in cloud computing
by: Diallo, Laouratou, et al.
Published: (2016)
by: Diallo, Laouratou, et al.
Published: (2016)
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016)
by: Shakir, Mohanaad, et al.
Published: (2016)
An enhanced architecture for big data task scheduling in cloud environment
by: Diallo, Laouratou, et al.
Published: (2016)
by: Diallo, Laouratou, et al.
Published: (2016)
A microservice-based architecture for an online product review analysis system / Mehdi Mohammadi
by: Mehdi , Mohammadi
Published: (2021)
by: Mehdi , Mohammadi
Published: (2021)
Big data storage, collection, & protection with Islamic perspective
by: Ibrahim Ahmed, Ibrahim Nasreldin, et al.
Published: (2014)
by: Ibrahim Ahmed, Ibrahim Nasreldin, et al.
Published: (2014)
Managing big RDF data in clouds: challenges, opportunities, and solutions
by: Nahla, Mohammed Elzein, et al.
Published: (2018)
by: Nahla, Mohammed Elzein, et al.
Published: (2018)
Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher
by: Alfiya Khanum, R.M., et al.
Published: (2024)
by: Alfiya Khanum, R.M., et al.
Published: (2024)
Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad
by: Mehdi , Jahanirad
Published: (2016)
by: Mehdi , Jahanirad
Published: (2016)
Investigation model for locating data remnants on cloud storage
by: Khalid, Abdulrahman, et al.
Published: (2019)
by: Khalid, Abdulrahman, et al.
Published: (2019)
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
by: Mehdi , Hussain
Published: (2017)
by: Mehdi , Hussain
Published: (2017)
Economic perspective analysis of protecting big data security and privacy
by: Tao, Hai, et al.
Published: (2019)
by: Tao, Hai, et al.
Published: (2019)
Cloud Masking for Remotely Sensed Data Using Spectral and Principal Components Analysis
by: Asmala, A., et al.
Published: (2012)
by: Asmala, A., et al.
Published: (2012)
A feature-based dual-layer ensemble classification method for emotional state recognition / Mehdi Malekzadeh
by: Mehdi , Malekzadeh
Published: (2017)
by: Mehdi , Malekzadeh
Published: (2017)
Fault Tolerance Impact on Near Field Communication for Data Storage of Mobile Commerce Technology in Cloud Computing
by: Noraziah, Ahmad, et al.
Published: (2015)
by: Noraziah, Ahmad, et al.
Published: (2015)
A model for computing skyline data items in cloud incomplete databases
by: Gulzar, Yonis, et al.
Published: (2020)
by: Gulzar, Yonis, et al.
Published: (2020)
SSM: Secure-Split-Merge data distribution in cloud infrastructure
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
CDS502 – Big Data Storage and Management
(Storan dan Pengurusan Data Raya)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CDS502 – Big Data Storage and Management
(Storan dan Pengurusan Data Raya)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
Data recovery and business continuity in cloud computing: a review of the research literature
by: Alshammari, Mohammad M., et al.
Published: (2016)
by: Alshammari, Mohammad M., et al.
Published: (2016)
Data recording, data retrieval and the big data phenomenon:
A Quranic perspective
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
CDS502 – Big Data Storage and Management(Storan dan Pengurusan Data Raya) - February 2022
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
Sierpinski triangle based data-center network architecture in cloud computing / Qi Han
by: Qi, Han
Published: (2016)
by: Qi, Han
Published: (2016)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
CDS502 - Big Data Storage and Management (December 2019 / January 2020)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2020)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2020)
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
by: Khan, Nawsher
Published: (2013)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Identifying skylines in cloud databases with incomplete data
by: Gulzar, Yonis, et al.
Published: (2019)
by: Gulzar, Yonis, et al.
Published: (2019)
Comprehensive survey on Big Data Privacy
Protection
by: BinJubeir, Mohammed, et al.
Published: (2019)
by: BinJubeir, Mohammed, et al.
Published: (2019)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
Data mining in computer auditing / Hiromi Wong, Siew Lan and Valery Fred Lee
by: Hiromi , Wong, et al.
Published: (2004)
by: Hiromi , Wong, et al.
Published: (2004)
Comparative Study to Measure the Quality of Big Scholarly Data and Its Hypothetical Mapping towards Granular Computing
by: Ahmed, M. M., et al.
Published: (2018)
by: Ahmed, M. M., et al.
Published: (2018)
Similar Items
-
Big data security
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014) -
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security
by: Manjunatha, V., et al.
Published: (2024) -
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014) -
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016) -
Risk assessment for Big Data in cloud computing: trust as an impact
by: Yusof Ali, Hazirah Bee, et al.
Published: (2019)