Machine learning for cloud security: a systematic review

AB Nassif, MA Talib, Q Nasir, H Albadani… - IEEE …, 2021 - ieeexplore.ieee.org
The popularity and usage of Cloud computing is increasing rapidly. Several companies are
investing in this field either for their own use or to provide it as a service for others. One of …

[HTML][HTML] Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends

MM Belal, DM Sundaram - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, machine learning and deep learning algorithms are used in recent studies as
active security techniques instead of traditional ones to secure the cloud environment based …

A practical privacy-preserving data aggregation (3PDA) scheme for smart grid

Y Liu, W Guo, CI Fan, L Chang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The real-time electricity consumption data can be used in value-added service such as big
data analysis, meanwhile the single user's privacy needs to be protected. How to balance …

A cloud-aided privacy-preserving multi-dimensional data comparison protocol

H Shen, M Zhang, H Wang, F Guo, W Susilo - Information Sciences, 2021 - Elsevier
With the emergence of mobile social networks, users can make friends or negotiate projects
at any time and anywhere in social communities through their mobile devices (such as …

Similarity search for encrypted images in secure cloud computing

Y Li, J Ma, Y Miao, Y Wang, X Liu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the emergence of intelligent terminals, the Content-Based Image Retrieval (CBIR)
technique has attracted much attention from many areas (ie, cloud computing, social …

A semantic-based methodology for digital forensics analysis

F Amato, A Castiglione, G Cozzolino… - Journal of Parallel and …, 2020 - Elsevier
Nowadays, more than ever, digital forensics activities are involved in any criminal, civil or
military investigation and represent a fundamental tool to support cyber-security …

Secure -NN Query on Encrypted Cloud Data with Multiple Keys

K Cheng, L Wang, Y Shen, H Wang… - … Transactions on Big …, 2017 - ieeexplore.ieee.org
The k-nearest neighbors (k-NN) query is a fundamental primitive in spatial and multimedia
databases. It has extensive applications in location-based services, classification & …

Privacy preserving security using biometrics in cloud computing

S Kumar, SK Singh, AK Singh, S Tiwari… - Multimedia Tools and …, 2018 - Springer
Cloud computing and the efficient storage provide new paradigms and approaches
designed at efficiently utilization of resources through computation and many alternatives to …

Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation

A Gumaei, R Sammouda, AMS Al-Salman… - Journal of Parallel and …, 2019 - Elsevier
Nowadays, cloud computing has provided enterprises and users with several capabilities to
process and store their data in various cloud data centers. Storing and processing these …

Accurate range query with privacy preservation for outsourced location-based service in IOT

Z Liu, L Wu, W Meng, H Wang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
With the maturity of Internet-of-Things technology, location-based service (LBS) is
develo** rapidly in intelligent terminal devices, and it brings new vitality to the fields of …