期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Towards Developing Privacy-Preserved Data Security Approach(PP-DSA)in Cloud Computing Environment
1
作者 S.Stewart Kirubakaran V.P.Arunachalam +1 位作者 S.Karthik S.K annan 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期1881-1895,共15页
In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several ... In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works. 展开更多
关键词 third-party auditor(TPA) efficient auditing technique(EAT) cloud service provider(CSP) data user(DU) data security PRIVACY-PRESERVING cloud computing cloud security
下载PDF
高星级酒店电子商务第三方托管实施绩效的评价体系研究
2
作者 周玲强 沈海莉 +3 位作者 冯一鸣 王庭福 叶楚良 孙宏嘉 《华中师范大学学报(自然科学版)》 CAS CSCD 北大核心 2022年第1期83-90,共8页
移动互联网的发展使高星级酒店行业与电子商务实现深度融合.在此背景下,科学地评价高星级酒店电子商务第三方托管实施绩效对推动旅游与酒店行业高质量发展具有重要意义.该文通过文献梳理、专家访谈和问卷调研等方法,构建了高星级酒店电... 移动互联网的发展使高星级酒店行业与电子商务实现深度融合.在此背景下,科学地评价高星级酒店电子商务第三方托管实施绩效对推动旅游与酒店行业高质量发展具有重要意义.该文通过文献梳理、专家访谈和问卷调研等方法,构建了高星级酒店电子商务第三方托管实施绩效的评价指标体系.该体系分为整体提升、核心过程、服务能力和风险克服四个方面,涵盖29个具体指标.在此基础上,借助IPA方法,对体系中各个指标的重要性程度与第三方托管服务商的实际表现之间的差异进行分析.结果表明,二者在整体上不相匹配.基于上述分析,该文为高星级酒店电子商务第三方托管行业的高质量发展提出相关建议. 展开更多
关键词 高星级酒店 电子商务 第三方托管 实施绩效 高质量发展
下载PDF
医疗设备第三方托管服务商的选择评价体系 被引量:6
3
作者 张应 印春光 《中国医学装备》 2019年第10期113-116,共4页
目的:探讨建立医疗设备第三方托管服务商选择评价体系,为医疗机构选择第三方托管服务商提供方法借鉴。方法:通过文献提炼、深入访谈、问卷调查和专家咨询4个路径,整理筛选出包括安全诚信、资产管理能力、维修维护管理能力及技术支持管... 目的:探讨建立医疗设备第三方托管服务商选择评价体系,为医疗机构选择第三方托管服务商提供方法借鉴。方法:通过文献提炼、深入访谈、问卷调查和专家咨询4个路径,整理筛选出包括安全诚信、资产管理能力、维修维护管理能力及技术支持管理能力等13项评价指标和60项评价内容,以及其中的8项必须满足项的第三方托管服务评价指标,建立第三方托管服务商评价流程和评价原则,采用定量综合评价方法,对每项评价指标设定权重分值,对评价指标内容逐一打分,以总分形式确定是否为合格的第三方托管服务商。结果:通过建立医疗设备第三方托管服务商选择评价体系,并实施应用,分析出目前医疗设备第三方托管服务的优、劣势及问题,制定相应对策。结论:第三方托管服务商的选择需因地制宜,全面深入,只有通过科学有效的手段筛选出合格的服务商,才能满足医院医疗设备的管理要求。 展开更多
关键词 现代医疗设备 设备管理 第三方托管服务商 选择评价体系 诚信
下载PDF
Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method
4
作者 J.Stanly Jayaprakash Kishore Balasubramanian +3 位作者 Rossilawati Sulaiman Mohammad Kamrul Hasan B.D.Parameshachari Celestine Iwendi 《Computers, Materials & Continua》 SCIE EI 2022年第7期519-534,共16页
Many organizations apply cloud computing to store and effectively process data for various applications.The user uploads the data in the cloud has less security due to the unreliable verification process of data integ... Many organizations apply cloud computing to store and effectively process data for various applications.The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity.In this research,an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data.Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data.Merkle Hash tree provides the efficient mapping of data and easily identifies the changesmade in the data due to proper structure.The developed model supports privacy-preserving public auditing to provide a secure cloud storage system.The data owners upload the data in the cloud and edit the data using the private key.An enhanced Merkle hash tree method stores the data in the cloud server and splits it into batches.The data files requested by the data owner are audit by a third-party auditor and the multiowner authentication method is applied during the modification process to authenticate the user.The result shows that the proposed method reduces the encryption and decryption time for cloud data storage by 2–167 ms when compared to the existing Advanced Encryption Standard and Blowfish. 展开更多
关键词 Cloud computing cloud data storage cloud service provider merkle hash tree multi-owner authentication third-party auditor
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部