Figure 2 - uploaded by Dr Umesh Kumar Lilhore
Content may be subject to copyright.
File Retrieval Process

File Retrieval Process

Source publication
Research
Full-text available
Cloud storage is one among the service provided by Cloud computing within which information is maintained, managed, secured remotely and created available to users over a network. The user concerning about the integrity of data hold on within the cloud because the user's data will be attacked or changed by outside attacker. Therefore, a new thought...

Contexts in source publication

Context 1
... finally data and audit report is send to data owner and re-decrypt the data using EC-RSA algorithm. In this way whole process of file retrieval is proceeded and shown in Figure 2. Detailed steps of File Retrieval Process are described as below:  Start  Send request to cloud server for data retrieval  Cloud server retrieve data from the data storage and decrypt divided data block using AES and Blowfish algorithm respectively. ...
Context 2
... finally data and audit report is send to data owner and re-decrypt the data using EC-RSA algorithm. In this way whole process of file retrieval is proceeded and shown in Figure 2. Detailed steps of File Retrieval Process are described as below:  Start  Send request to cloud server for data retrieval  Cloud server retrieve data from the data storage and decrypt divided data block using AES and Blowfish algorithm respectively. ...

Similar publications

Article
Full-text available
Cloud storage represents a cloud delivered-service model which draws the attention of organizations and individuals due to its uncounted attractive advantages. Cloud Service Providers (CSPs) supply storage facilities while the cloud user has the ability to manage and migrate its own data towards remote cloud servers in ubiquitous and cost-effective...
Preprint
Full-text available
Online cloud data storage is a rapidly growing pillar of the IT industry that offers data owners an array of attractive developments in highly sought-after online scalable storage services. Cloud users can easily access these services and have the flexibility to manage their process data effectively without worrying about the deployment or maintena...
Article
Full-text available
Privacy and trust are highly demanding in practical recommendation engines. Although Federated Learning (FL) has significantly addressed privacy concerns, commercial operators are still worried about several technical challenges while bringing FL into production. Additionally, classical FL has several intrinsic operational limitations such as singl...
Article
Full-text available
Federated Learning is a promising technique for preserving data privacy that enables communication between distributed nodes without the need for a central server. Previously, data privacy concerns have made it challenging for firms to share large datasets in critical locations, as network data tampering is a potential risk. Federated Learning offe...
Article
Full-text available
The federated learning (FL) approach in machine learning preserves user privacy during data collection. However, traditional FL schemes still rely on a centralized server, making them vulnerable to security risks, such as data breaches and tampering of models caused by malicious actors attempting to gain access by masquerading as trainers. To addre...