[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Search published articles ::
Showing 2 results for Bayat

Mr Saeid Rezaei, Mr Mohammad Ali Doostari, Mr Majid Bayat,
Volume 5, Issue 1 (9-2016)
Abstract

Cloud environment are known as a revolution in IT industry in the recent decade and many organizations have used this service for data processing and data storage. Despite of fast growing and numerous advantages, some organizations still do not use this service due to security problems and privacy issues related to storing sensitive data on the untrusted cloud servers. Access control management utilizing encryption techniques is one of the most common methods to solve these kinds of problems. Attribute based encryption is a new cryptographic model which uses descriptive attributes and access structures for managing access control. This article discusses the most recent methods of access control in cloud environment using attribute based encryption. We classify these protocols with respect of efficiently and security features. Finally, all the strengths and weaknesses points of reviewed articles are discussed and a comprehensive security and practical comparison is presented.


Miss Aniseh Najafi, Dr Majid Bayat, Dr Hamid Haj Seyyed Javadi,
Volume 7, Issue 1 (9-2018)
Abstract

The growth of data production in the world brings with it capacities and requirements. On the one hand, the storage of generated data provides the possibility of reuse and analysis on the data that leads to the production of data science. On the other hand, large amounts of data require storage space and the ability to search over them. Cloud computing is a technological and operational model that addresses the storage and computing limitations of data storage and utilization. As well as searchable encryption as a cloud-based, highly used, technique, in addition to maintaining data security, it can search over them. In this paper, the searchable encryption methods and the limitations and capabilities of each one are examined. At the end, there are some explanations on how to use searchable encryption in medical data.


Page 1 from 1     

دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.11 seconds with 28 queries by YEKTAWEB 4704