Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
2 results
Search Results
Item Secure similarity based document retrieval system in cloud(2012) Gopal, G.N.; Singh, M.P.The introduction of Cloud computing concept has been instrumental in reducing resource unavailability in cyber world. Privacy of data stored in cloud resources though is a debatable subject and a matter of concern. As the number of documents stored on cloud resources increase, a search engine will have to be employed to search for information. Due to increased concern on these search engines itself misusing data, users are apprehensive about treating cloud resources as a data storage medium. Through this project we try to improve the security in cloud computing by introducing encryption of count list, as well as documents. The search is performed with the hashed keywords. Limitations in cloud computing are addressed by maximizing the utilization of cloud computing resources. © 2012 IEEE.Item Blockchain based Data Access Control using Smart Contracts(Institute of Electrical and Electronics Engineers Inc., 2019) Kiran, A.; Dharanikota, S.; Annappa, A.The keystone of information security has been access control. Very often, User data is misused and users are oblivious to the use of their data by unauthorized parties. Current strategies to provide storage for confidential data and subsequent authentication involve relying on a trusted third party for the same, which could be victims of Denial of Service (DoS) attacks or technical failures. This paper examines a strategy where the underlying framework for providing Access Control is the blockchain, hence decentralizing the mechanism of providing access control. Further in this paper, we demonstrate and model the User Data access on the Ethereum framework. Personal Information of the user by a website or an application is retrieved on a need-to-know basis from the off-blockchain, as determined by the user, the true owner of the data. Personal data is highly protected and the different permissions to different websites or applications are determined by the Smart Contract. © 2019 IEEE.
