User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 38
 Downloands 4
PRIVACY PRESERVING AND PUBLIC AUDITING MECHANISM FOR SHARED DATA IN THE CLOUD INFRASTRUCTURE
2021
Journal:  
İlköğretim Online
Author:  
Abstract:

More recently, the capability of computational power being dispersed in the cloud is seen as a massive leap forward that allows for improvements in network bandwidth, computational power capacity expansion, and the ability to store data on the cloud. The knowledge is updated and shared more readily on the cloud, which is beneficial for clients. To verify the consistency of shared data blocks, you must compute the authentication signatures on all of each one (client-side)node and each peer- (or all)nodes in the cluster. A distinct block of shared data was registered with a distinct user. The block must be re-signed by the user who still has access to it if it has been withdrawn from the previous signatory (a user previously permitted to sign blocks must still be present if blocks are being reissued to him). However, since files of this size affect cloud performance, there is the risk of bogging down the server while sending and accessing them. If the shared data that the user previously had downloaded has expired, the former client will automatically re-sign at the time of user revocation. Since the current system is less focused on protection and the data backup process, data is vulnerable to lose in a system failure event. It was the first paper to introduce the truth about shared data and the use of AES encryption to secure data against cloud server tampering and suggested the use of a new mechanism to locate it, such as the recovery procedure. Comparison of the two systems revealed far more flaws in the current system, but several additional problems with the new one and another critical aspect of the Group Policy Management feature are key revocation. When a user is kicked out of a group, their personal security credentials (i.e. his or her keystrokes) are revoked, new personal keys are distributed to current users in the group.

Keywords:

0
2021
Author:  
Citation Owners
Information: There is no ciation to this publication.
Similar Articles












İlköğretim Online

Field :   Eğitim Bilimleri

Journal Type :   Ulusal

Metrics
Article : 6.985
Cite : 20.368
2023 Impact : 0.025
İlköğretim Online