A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (original) (raw)

Fingerprinting Based Recursive Information Hiding Strategy in Cloud Computing Environment

varsha yadav

2014

View PDFchevron_right

Collusion-secure fingerprinting for digital data

James Shaw

IEEE Transactions on Information Theory, 1998

View PDFchevron_right

Cryptographic Hashing Method using for Secure and Similarity Detection in Distributed Cloud Data

Nooria Sukmaningtyas

View PDFchevron_right

A Novel Approach to Security System of Multimedia Contents Protection for Cloud Computing

IJRASET Publication

International Journal for Research in Applied Science & Engineering Technology, 2021

View PDFchevron_right

Constructing a virtual primary key for fingerprinting relational data

Sushil Jajodia

2003

View PDFchevron_right

Pseudonym-Based Privacy Preserving Framework for Facilitating Cloud Data Security

Premila Rosy

International Journal of Recent Technology and Engineering, 2019

View PDFchevron_right

Review on Preserving Privacy Identity of Shared Data in Cloud

International Journal IJRITCC

View PDFchevron_right

A Proposal for Standardized Data Attribution and Ownership in the Cloud Environment

talal jameel

American Journal of Applied Sciences

View PDFchevron_right

Enhancing Data Privacy and Access Anonymity in Cloud Computing

Nabil Juily

View PDFchevron_right

Data Identification and Control Mechanism Using Distinguishing, Attacks In Cloud

International Journal of Scientific Research in Science and Technology IJSRST

View PDFchevron_right

IJERT-An Efficient Technique to provide Security for Data Owners in Cloud Computing

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2012

View PDFchevron_right

Security and Privacy of Data in Cloud Computing

Rajesh Ingle

International Journal of Recent Technology and Engineering (IJRTE), 2019

View PDFchevron_right

A database watermarking service with a trusted authority architecture for Cloud environment

Nour Saad Taher El-Zawawi

View PDFchevron_right

PRESERVING IDENTITY OF SHARED DATA STORED IN THE CLOUD USING PUBLIC AUDIT MECHANISM

IJESRT JOURNAL

View PDFchevron_right

IDENTIFYING INFORMATION RELOCATE WITH RELIABLE ESTIMATION AND SECURING DATA ON CLOUD COMPUTING

IRJET Journal

View PDFchevron_right

Fingerprinting Numeric Databases with Information Preservation and Collusion Avoidance

Madhuri Joshi

International Journal of Computer Applications, 2015

View PDFchevron_right

Maintaining Privacy and Overcoming Duplication Overhead in Cloud Computing

zarka khan

2019

View PDFchevron_right

Protection Aware User Identity and Data Storage (PAUIDS) Scheme for Management of User Identification in Cloud

sunitha ram

International Journal of Soft Computing and Engineering, 2021

View PDFchevron_right

A Robust, Distortion Minimization Fingerprinting Technique for Relational Database

International Journal IJRITCC

View PDFchevron_right

Review Paper on Preserving Confidentiality of Data in Cloud Using Dynamic Anonymization

Bhushan Mahajan

2012

View PDFchevron_right

Preserving Identify the User and Privacy of Data Usingcloud

S.divya Lakshmi

2017

View PDFchevron_right

IRJET- IDENTIFYING INFORMATION RELOCATE WITH RELIABLE ESTIMATION AND SECURING DATA ON CLOUD COMPUTING

IRJET Journal

IRJET, 2020

View PDFchevron_right

Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud

IOSR Journals

View PDFchevron_right

Enhancement of Data Security in Cloud Computing: Issues and Challenges

IOSR Journals

View PDFchevron_right

Collusion Avoidance in Fingerprinting Outsourced Relational Databases with Knowledge Preservation

International Journal IJRITCC

View PDFchevron_right

ATTRIBUTE BASED PRIVACY PROTECTION ON CLOUD COMPUTING WITH AUDITING SCHEME

WARSE The World Academy of Research in Science and Engineering

International Journal of Information Systems and Computer Sciences, 2019

View PDFchevron_right

Advanced Traceability Mechanism for Shared Data in the Cloud

Sandip Kahate

international journal of engineering trends and technology, 2014

View PDFchevron_right

Survey: Multimedia Copyright Protection on Cloud

Shital Kakade

IARJSET, 2017

View PDFchevron_right

Data Provenance for Cloud Computing using Watermark

Ramzan Talib

International Journal of Advanced Computer Science and Applications, 2017

View PDFchevron_right

Secure Evaluation and Prevention of Duplicate Data in Cloud

IJIRST - International Journal for Innovative Research in Science and Technology

View PDFchevron_right

Privacy in the Cloud: A Survey of Existing Solutions and Research Challenges

Paulo Silva

IEEE Access, 2021

View PDFchevron_right

Secure De-Duplication in Cloud Computing Environment by Managing Ownership Dynamically

IJEACS UK

View PDFchevron_right

The Curse of Correlations for Robust Fingerprinting of Relational Databases

Erman Ayday

24th International Symposium on Research in Attacks, Intrusions and Defenses, 2021

View PDFchevron_right

A SYSTEM TO SUSTAIN IDENTITY SECRECY OF A USER ON SHARED DATA IN THE CLOUD

IJESRT Journal

View PDFchevron_right